Best of
Technology

2005

The Elements of Computing Systems: Building a Modern Computer from First Principles


Noam Nisan - 2005
    The books also provides a companion web site that provides the toold and materials necessary to build the hardware and software.

Infrastructure: A Field Guide to the Industrial Landscape


Brian Hayes - 2005
    . . . An extraordinary book.”—Anne Eisenberg, Scientific AmericanA companion to the man-made landscape that reveals how our industrial environment can be as dazzling as the natural world. Replete with the author's striking photographs, "Infrastructure" is a unique and spectacular guide, exploring all the major "ecosystems" of our modern industrial world, revealing what the structures are and why they're there, and uncovering beauty in unexpected places--awakening and fulfilling a curiosity you didn't know you had. Covering agriculture, resources, energy, communication, transportation, manufacturing, and waste, this is the "Book of Everything" for the industrial landscape. The objects that fill our everyday environment are streetlights, railroad tracks, antenna towers, highway overpasses, power lines, satellite dishes, and thousands of other manufactured items, many of them so familiar we hardly notice them. Larger and more exotic facilities have transformed vast tracts of the landscape: coal mines, nuclear power plants, grain elevators, oil refineries, and steel mills, to name a few. "Infrastructure" is a compelling and clear guide for those who want to explore and understand this mysterious world we've made for ourselves. 500 color illustrations.ContentsPreface1. Out of the earth2. Waterworks3. Food and farming4. Oil and gas5. Power plants6. The power grid7. Communications8. On the road9. The railroad10. Bridges and tunnels11. Aviation12. Shipping13. Wastes and recyclingAfterword: The postindustrial landscapeA note on the photographsFurther readingIndex

Time Management for System Administrators: Stop Working Late and Start Working Smart


Thomas A. Limoncelli - 2005
    No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with reques ... Available here:readmeaway.com/download?i=0596007833Time Management for System Administrators: Stop Working Late and Start Working Smart PDF by Thomas A. LimoncelliRead Time Management for System Administrators: Stop Working Late and Start Working Smart PDF from O'Reilly Media,Thomas A. LimoncelliDownload Thomas A. Limoncelli’s PDF E-book Time Management for System Administrators: Stop Working Late and Start Working Smart

Head First HTML with CSS & XHTML


Elisabeth Robson - 2005
    You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family, fans, and fanatic customers. You also want to do it right so you can actually maintain and expand your Web pages over time, and so your web pages work in all the browsers and mobile devices out there. Oh, and if you've never heard of CSS, that's okay - we won't tell anyone you're still partying like it's 1999 - but if you're going to create Web pages in the 21st century then you'll want to know and understand CSS.Learn the real secrets of creating Web pages, and why everything your boss told you about HTML tables is probably wrong (and what to do instead). Most importantly, hold your own with your co-worker (and impress cocktail party guests) when he casually mentions how his HTML is now strict, and his CSS is in an external style sheet.With Head First HTML with CSS & XHTML, you'll avoid the embarrassment of thinking web-safe colors still matter, and the foolishness of slipping a font tag into your pages. Best of all, you'll learn HTML and CSS in a way that won't put you to sleep. If you've read a Head First book, you know what to expect: a visually-rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, this book will load HTML, CSS, and XHTML into your brain in a way that sticks.So what are you waiting for? Leave those other dusty books behind and come join us in Webville. Your tour is about to begin."Elegant design is at the core of every chapter here, each concept conveyed with equal doses of pragmatism and wit." --Ken Goldstein, Executive Vice President, Disney Online"This book is a thoroughly modern introduction to forward-looking practices in web page markup and presentation." --Danny Goodman, author of Dynamic HTML: The Definitive Guide"What used to be a long trial and error learning process has now been reduced neatly into an engaging paperback." --Mike Davidson, CEO, Newsvine, Inc."I love Head First HTML with CSS & XHTML--it teaches you everything you need to learn in a 'fun coated' format!" --Sally Applin, UI Designer and Artist"I haven't had as much fun reading a book (other than Harry Potter) in years. And your book finally helped me break out of my hapless so-last-century way of creating web pages." --Professor David M. Arnow, Department of Computer and Information Science, Brooklyn College"If you've ever had a family member who wanted you to design a website for them, buy them Head First HTML with CSS and XHTML. If you've ever asked a family member to design you a web site, buy this book. If you've ever bought an HTML book and ended up using it to level your desk, or for kindling on a cold winter day, buy this book. This is the book you've been waiting for. This is the learning system you've been waiting for." --Warren Kelly, Blogcritics.org

On the Edge: The Spectacular Rise and Fall of Commodore


Brian Bagnall - 2005
    Before Apple, IBM, or Dell, Commodore was the first computer maker to market its machines to the public, selling an estimated 22 million Commodore 64s. These halcyon days were tumultuous, however, owing to the expectations and unsparing tactics of founder Jack Tramiel. Engineers and managers with the company between 1976 and 1994 share their experiences of the groundbreaking moments, soaring business highs, and stunning employee turnover that came along with being on top of the PC world in the early days.

Human Technology: A Toolkit for Authentic Living


Ilchi Lee - 2005
    Meditation, breath-work, and Oriental healing arts are offered as self-reliant health management skills. A distinctive perspective on relationships and an inspirational guide to discover a passionate life purpose are featured. This book also includes a practical guide to optimize our life's master controller?the brain. In the name of comfort and security, we have created increasingly complex systems that demand our lives for their maintenance. Systems cannot answer life's most important questions?only you can. The ultimate goal of education, institutions, and expertise should be self-education. Only then will technology serve humanity rather than reign over us. Human Technology contains the principles and tools that can return us to self-mastery and the life well lived. Human Technology is a toolkit for living an authentic life.

The Man Behind the Microchip: Robert Noyce and the Invention of Silicon Valley


Leslie Berlin - 2005
    The Man Behind the Microchip Robert Noyce and the Invention of Silicon Valley published in the year 2005 was published by Oxford University Press. The author of this book is Leslie Berlin. ed page displaying collection of Leslie Berlin books here. This is the Hardback version of the title "The Man Behind the Microchip Robert Noyce and the Invention of Silicon Valley" and have around pp. xiii + 402 pages. The Man Behind the Microchip Robert Noyce and the Invention of Silicon Valley is currently Available with us.

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Bulletproof Web Design: Improving Flexibility and Protecting Against Worst-Case Scenarios with XHTML and CSS


Dan Cederholm - 2005
    This work deconstructs a series of real-world Web sites. It provides 10 strategies for creating standards-based designs that provide user control - a component of every Web site.

Perl Best Practices: Standards and Styles for Developing Maintainable Code


Damian Conway - 2005
    They aren't conscious of all the choices they make, like how they format their source, the names they use for variables, or the kinds of loops they use. They're focused entirely on problems they're solving, solutions they're creating, and algorithms they're implementing. So they write code in the way that seems natural, that happens intuitively, and that feels good.But if you're serious about your profession, intuition isn't enough. Perl Best Practices author Damian Conway explains that rules, conventions, standards, and practices not only help programmers communicate and coordinate with one another, they also provide a reliable framework for thinking about problems, and a common language for expressing solutions. This is especially critical in Perl, because the language is designed to offer many ways to accomplish the same task, and consequently it supports many incompatible dialects.With a good dose of Aussie humor, Dr. Conway (familiar to many in the Perl community) offers 256 guidelines on the art of coding to help you write better Perl code--in fact, the best Perl code you possibly can. The guidelines cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging.They're designed to work together to produce code that is clear, robust, efficient, maintainable, and concise, but Dr. Conway doesn't pretend that this is the one true universal and unequivocal set of best practices. Instead, Perl Best Practices offers coherent and widely applicable suggestions based on real-world experience of how code is actually written, rather than on someone's ivory-tower theories on how software ought to be created.Most of all, Perl Best Practices offers guidelines that actually work, and that many developers around the world are already using. Much like Perl itself, these guidelines are about helping you to get your job done, without getting in the way.Praise for Perl Best Practices from Perl community members:"As a manager of a large Perl project, I'd ensure that every member of my team has a copy of Perl Best Practices on their desk, and use it as the basis for an in-house style guide." -- Randal Schwartz"There are no more excuses for writing bad Perl programs. All levels of Perl programmer will be more productive after reading this book." -- Peter Scott"Perl Best Practices will be the next big important book in the evolution of Perl. The ideas and practices Damian lays down will help bring Perl out from under the embarrassing heading of "scripting languages". Many of us have known Perl is a real programming language, worthy of all the tasks normally delegated to Java and C++. With Perl Best Practices, Damian shows specifically how and why, so everyone else can see, too." -- Andy Lester"Damian's done what many thought impossible: show how to build large, maintainable Perl applications, while still letting Perl be the powerful, expressive language that programmers have loved for years." -- Bill Odom"Finally, a means to bring lasting order to the process and product of real Perl development teams." -- Andrew Sundstrom"Perl Best Practices provides a valuable education in how to write robust, maintainable P

iCon: Steve Jobs, the Greatest Second Act in the History of Business


Jeffrey S. Young - 2005
    Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail Jobs's meteoric rise, and the devastating plunge that left him not only out of Apple, but out of the computer-making business entirely. This unflinching and completely unauthorized portrait reveals both sides of Jobs's role in the remarkable rise of the Pixar animation studio, also re-creates the acrimony between Jobs and Disney's Michael Eisner, and examines Jobs's dramatic his rise from the ashes with his recapture of Apple. The authors examine the takeover and Jobs's reinvention of the company with the popular iMac and his transformation of the industry with the revolutionary iPod. iCon is must reading for anyone who wants to understand how the modern digital age has been formed, shaped, and refined by the most influential figure of the age-a master of three industries: movies, music, and computers.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Expert Oracle Database Architecture: Oracle Database 9i, 10g, and 11g Programming Techniques and Solutions


Thomas Kyte - 2005
    Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then you’ll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised second edition covers the latest developments in Oracle Database 11g. Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it. Don’t treat Oracle Database as a black-box. Get this book. Get under the hood. Turbo-charge your career. Fully-revised to cover Oracle Database 11g Proof-by-example approach: Let the evidence be your guide Dives deeply into Oracle Databases’s most powerful features What you’ll learn Develop an evidence-based approach to problem solving Manage transactions in highly concurrent environments Speed access to data through table and index design Manage files and memory structures for performance and reliability Scale up through partitioning and parallel processing Load and unload data to interface with external systems Think for yourself; don’t take Tom’s word for it! Who this book is for This book is aimed at Oracle Database administrators, at PL/SQL and Java developers writing code to be deployed inside the database, and at developers of external applications who use Oracle Database as a data store. It is the go to book for those wishing to create efficient and scalable applications.

Linux Device Drivers


Jonathan Corbet - 2005
    And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.

On Light and Other High Frequency Phenomena


Nikola Tesla - 2005
    Louis, March 1893.

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives


Nick Rozanski - 2005
    This practical, practitioner-oriented guide explains how to design successful architectures for information systems and to see these through to their successful implementation.

Droidmaker: George Lucas and the Digital Revolution


Michael Rubin - 2005
    In the process they made computer history.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Extrusion Detection: Security Monitoring for Internal Intrusions


Richard Bejtlich - 2005
    Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates. Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur.Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection , he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself.Coverage includesArchitecting defensible networks with pervasive awareness: theory, techniques, and tools Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and more Dissecting session and full-content data to reveal unauthorized activity Implementing effective Layer 3 network access control Responding to internal attacks, including step-by-step network forensics Assessing your network's current ability to resist internal attacks Setting reasonable corporate access policies Detailed case studies, including the discovery of internal and IRC-based bot nets Advanced extrusion detection: from data collection to host and vulnerability enumeration About the Web Site Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, www.bejtlich.net.

Destination Moon: The Apollo Missions in the Astronauts' Own Words


Rod Pyle - 2005
    In three short years, from 1969-1972, nine missions headed to the moon, and six of them landed men on its surface and safely returned home. Destination Moon tells the significant, spectacular, and intriguing story of the Apollo program through first-person accounts by the astronauts themselves; both their mission dialogue and retrospective reminiscences; explained and put into context with expert commentary by Rod Pyle. With more than 100 images, some rarely seen, Destination Moon is a whole new look at one of mankind's most extraordinary achievements.

Saturn V Flight Manual


National Aeronautics and Space Administration - 2005
    The only launch vehicle in history to transport astronauts beyond Low Earth Orbit, the Saturn V delivered 24 men to the moon. To this day it holds records as the tallest (363 feet), heaviest (nearly 7 million lbs.) and most powerful (over 7.6 million pounds-force of thrust) launch vehicle ever produced. It also remains one of the most reliable, achieving 12 successful launches with one partial failure the unmanned Apollo 6 which suffered vibration damage on lift-off, resulting in a sub-standard orbit. The Saturn series of rockets resulted from Von Braun s work on the German V-2 and Jupiter series rockets. The Saturn I, a 2-stage liquid-fueled rocket, flew ten times between 1961 and 1965. A uprated version the 1B carried the first crewed Apollo flight into orbit in 1968. The Saturn V, which first flew in 1967, was a three-stage rocket. The first stage, which burned RP-1 and LOX, consisted of five F-1 engines. The second stage used five J-2 engines which burned LOX and liquid hydrogen (LH2). The third stage, based on the second stage of the Saturn 1B, carried a single J-2. The Saturn V could carry up to 262,000 pounds to Low Earth Orbit and more critically, 100,000 pounds to the Moon. Created by NASA as a single-source reference as to the characteristics and functions of the Saturn V, this manual was standard issue to the astronauts of the Apollo and Skylab eras. It contains information about the Saturn V system, range safety and instrumentation, monitoring and control, prelaunch events, and pogo oscillations. It provides a fascinating overview of the rocket that made one giant leap for mankind possible."

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

SQL Cookbook


Anthony Molinaro - 2005
    You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is so much more you can do with the language. In the SQL Cookbook, experienced SQL developer Anthony Molinaro shares his favorite SQL techniques and features. You'll learn about:Window functions, arguably the most significant enhancement to SQL in the past decade. If you're not using these, you're missing outPowerful, database-specific features such as SQL Server's PIVOT and UNPIVOT operators, Oracle's MODEL clause, and PostgreSQL's very useful GENERATE_SERIES functionPivoting rows into columns, reverse-pivoting columns into rows, using pivoting to facilitate inter-row calculations, and double-pivoting a result setBucketization, and why you should never use that term in Brooklyn.How to create histograms, summarize data into buckets, perform aggregations over a moving range of values, generate running-totals and subtotals, and other advanced, data warehousing techniquesThe technique of walking a string, which allows you to use SQL to parse through the characters, words, or delimited elements of a stringWritten in O'Reilly's popular Problem/Solution/Discussion style, the SQL Cookbook is sure to please. Anthony's credo is: When it comes down to it, we all go to work, we all have bills to pay, and we all want to go home at a reasonable time and enjoy what's still available of our days. The SQL Cookbook moves quickly from problem to solution, saving you time each step of the way.

The Zen of CSS Design: Visual Enlightenment for the Web


Dave Shea - 2005
    Proving once and for all that standards-compliant design does not equal dull design, this inspiring tome uses examples from the landmark CSS Zen Garden site as the foundation for discussions on how to create beautiful, progressive CSS-based Web sites.

Information Security: Principles and Practice


Mark Stamp - 2005
    This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

A Practical Guide to Linux Commands, Editors, and Shell Programming


Mark G. Sobell - 2005
    The book is a complete revision of the commands section of Sobell's Practical Guide to Linux - a proven best-seller. The book is Linux distribution and release agnostic. It will appeal to users of ALL Linux distributions. Superior examples make this book the the best option on the market! System administrators, software developers, quality assurance engineers and others working on a Linux system need to work from the command line in order to be effective. Linux is famous for its huge number of command line utility programs, and the programs themselves are famous for their large numbers of options, switches, and configuration files. But the truth is that users will only use a limited (but still significant) number of these utilities on a recurring basis, and then only with a subset of the most important and useful options, switches and configuration files. This book cuts through all the noise and shows them which utilities are most useful, and which options most important. And it contains examples, lot's and lot's of examples. programmability. Utilities are designed, by default, to work wtih other utilities within shell programs as a way of automating system tasks. This book contains a superb introduction to Linux shell programming. And since shell programmers need to write their programs in text editors, this book covers the two most popular ones: vi and emacs.

Making Silicon Valley: Innovation and the Growth of High Tech, 1930-1970


Christophe Lécuyer - 2005
    Using the tools of science and technology studies, he explores the formation of Silicon Valley as an industrial district, from its beginnings as the home of a few radio enterprises that operated in the shadow of RCA and other East Coast firms through its establishment as a center of the electronics industry and a leading producer of power grid tubes, microwave tubes, and semiconductors. He traces the emergence of the innovative practices that made this growth possible by following key groups of engineers and entrepreneurs. He examines the forces outside Silicon Valley that shaped the industry -- in particular the effect of military patronage and procurement on the growth of the industry and on the development of technologies -- and considers the influence of Stanford University and other local institutions of higher learning.L'cuyer argues that Silicon Valley's emergence and its growth were made possible by the development of unique competencies in manufacturing, in product engineering, and in management. Entrepreneurs learned to integrate invention, design, manufacturing, and sales logistics, and they developed incentives to attract and retain a skilled and motivated workforce. The largest Silicon Valley firms -- including Eitel-McCullough (Eimac), Litton Industries, Varian Associates, Fairchild Semiconductor, and Intel -- dominated the American markets for advanced tubes and semiconductors and, because of their innovations in manufacturing, design, and management, served as models and incubators for other electronics ventures in the area.

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

The Encyclopedia of Game Machines: Consoles, Handhelds & Home Computers 1972–2005


Winnie Forster - 2005
    The near-ubiquity of video games means that nearly every reader will have owned, played, or heard about at least a handful of the machines included, whether from Europe, Japan, or the United States. Beyond just images of the gaming decks, the book covers classic software in all of its authentic, pixilated glory, as well as key technical facts for each console and operating system. With nostalgia and an archivist's attention to detail, this compendium of virtual competition looks back on 33 years of staring at screens and furiously pressing buttons.

CCNA Portable Command Guide


Scott Empson - 2005
    The New Edition of this Best-Selling Portable Command Guide is Completely Updated and includes Content, Tips, and Examples for all Topics Covered in the New Exams. To succeed as a Cisco network professional, you need to keep track of scores of commands, keywords, command arguments, options, and prompts -- and Cisco's new CCNA(R) exams test you on most of these. Getting familiar with all these commands is a daunting task. "CCNA Portable Command Guide, Third Edition" brings them all together in one condensed, portable, easy-to-use reference. Packed with valuable, easy-to-access information, it's portable enough to use whether you're in the server room or the equipment closet. Completely updated for Cisco's latest CCNA exams (ICND1 100-101, ICND2 200-101, and CCNA 200-120), it summarizes all CCNA certification-level Cisco IOS(R) Software commands, keywords, command arguments, and associated prompts. You'll find dozens of tips and examples for applying these commands in real-world networking scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in basic network designs. The topics covered are:TCP/IPv4An Introduction to Cisco DevicesConfiguring a RouterRoutingSwitchingLayer 3 RedundancyIPv6Network Administration and TroubleshootingFeatures of the Portable Command Guide:Access all CCNA commands-use as a quick, offline resource for research and solutionsLogical how-to topic groupings provide one-stop researchGreat for review before CCNA certification examsCompact size makes it easy to carry with you, wherever you go"Create Your Own Journal" section with blank, lined pages allows you to personalize the book for your needs"What Do You Want to Do?" chart inside back cover helps you to quickly reference specific tasksScott Empson is the Associate Chair of the Bachelor of Applied Information Systems Technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he teaches Cisco routing, switching, and network design courses. Scott is also the Program Coordinator of the Cisco Networking Academy Program at NAIT, a Regional Academy covering Central and Northern Alberta. He has earned three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/Language Arts; and a Bachelor of Applied Information Systems Technology, with a major in Network Management. Scott also has a Masters of Education degree from the University of Portland. He holds several industry certifications, including CCNP, CCAI, Network+ and CEH. Scott is the series creator and one of the authors of the Portable Command Guide Series. Portable Command Guides are filled with valuable, easy-to-access information to quickly refresh your memory. Each guide is portable enough for use whether you're in the server room or the equipment closet. This book is part of the Cisco Press(R) Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco(R) certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Java: A Beginner's Guide (Beginner's Guide)


Herbert Schildt - 2005
    This text has been tailored to meet the needs of the beginning Java programmer, with hands-on coverage, step-by-step instructions and tutorials.

Subnature: Architecture's Other Environments


David Gissen - 2005
    Much of today's discussion about sustainable and green design revolves around efforts to clean or filter out these primitive elements. While mostly the direct result of human habitation, these "subnatural forces" are nothing new. In fact, our ability to manage these forces has long defined the limits of civilized life. From its origins, architecture has been engaged in both fighting and embracing these so-called destructive forces. In Subnature, David Gissen, author of our critically acclaimed Big and Green, examines experimental work by today's leading designers, scholars, philosophers, and biologists that rejects the idea that humans can somehow recreate a purely natural world, free of the untidy elements that actually constitute nature. Each chapter provides an examination of a particular form of subnature and its actualization in contemporary designpractice.The exhilarating and at times unsettling work featured in Subnature suggests an alternative view of natural processes and ecosystems and their relationships to human society and architecture. R&Sien's Mosquito Bottleneck house in Trinidad uses a skin that actually attracts mosquitoes and moves them through the building, while keeping them separate from the occupants. In his building designs the architect Philippe Rahm draws the dank air from the earth and the gasses and moisture from our breath to define new forms of spatial experience. In his Underground House, Mollier House, and Omnisport Hall, Rahm forces us to consider the odor of soil and the emissionsfrom our body as the natural context of a future architecture. [Cero 9]'s design for the Magic Mountain captures excess heat emitted from a power generator in Ames, Iowa, to fuel a rose garden that embellishes the industrial site and creates a natural mountain rising above the city's skyline. Subnature looks beyond LEED ratings, green roofs, and solar panels toward a progressive architecture based on a radical new conception of nature.

Understanding Linux Network Internals


Christian Benvenuti - 2005
    Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:Key problems with networkingNetwork interface card (NIC) device driversSystem initializationLayer 2 (link-layer) tasks and implementationLayer 3 (IPv4) tasks and implementationNeighbor infrastructure and protocols (ARP)BridgingRoutingICMPAuthor Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.

Database Security and Auditing: Protecting Data Integrity and Accessibility


Hassan A. Afyouni - 2005
    Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. Each chapter ends with exercises and a hands-on project to reinforce and showcase the topics learned. The final chapter of the book allows the students to apply their knowledge in a presentation of four real-world cases using security and auditing.

Aggressive Network Self-Defense


Neil R. Wyler - 2005
    Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.

The Biology of Soil: A Community and Ecosystem Approach


Richard D. Bardgett - 2005
    It describes the vast diversityof biota that live in the soil environment - the most complex habitat on earth - and discusses the factors that act as determinants of this diversity across different spacial and temporal scales. The Biology of Soil also considers how biotic interactions in soil influence the important soilprocesses of decomposition and nutrient cycling. It demonstrates how interactions and feedbacks between diverse plant and soil communities act as important drivers of ecosystem form and function. The importance of these relationships for understanding how ecosystems respond to global changephenomena, including climate change, is discussed in depth. Much is still to be learned about the soil biota and their roles in ecosystems, and the author highlights some of the many challenges that face ecologists in the exploration of soil. Richard Bardgett has wide experience in soil andterrestrial ecology, and his background of research in many ecosystems is reflected in this book which is the most comprehensive, up-to-date volume currently available in soil ecology. It provides an introduction to the biology of soil, and it also discussed the most recent developments in thisprogressive field of ecology. The importance of soil biotic interactions or community and ecosystem ecology is illustrated through the use of numerous examples and case studies. The Biology of Soil provides an excellent, easy to read introduction to anyone working in the field of soil ecology andrelated disciplines, and will be ideal for students taking undergraduate and postgraduate courses in soil ecology, plant-soil relationships, ecosystem ecology, and land management.

Professional Excel Development: The Definitive Guide to Developing Applications Using Microsoft Excel and VBA


Stephen Bullen - 2005
    It has become adevelopment platform in it own right. Applications written using Excel are partof many corporations' core suites of business-critical applications. In spite ofthis, Excel is too often thought of as a hobbyist's platform. While there arenumerous titles on Excel and VBA, until now there have been none thatprovide an overall explanation of how to develop professional-quality Excel-basedapplications. All three authors are professional Excel developers who runtheir own companies developing Excel-based apps for clients ranging fromindividuals to the largest multinational corporations. In this book they showhow anyone from power users to professional developers can increase thespeed and usefulness of their Excel-based apps.

The Encyclopedia Of Medical Breakthroughs & Forbidden Treatments: Health Secrets & Little Known Therapies For Specific Health Conditions From A To Z


Medical Research Associates - 2005
    

Fundamentals of Radar Signal Processing


Mark A. Richards - 2005
    End-of-chapter problems reinforce the material covered. Developed over many years of academic and professional education, this authoritative resource is ideal for graduate students as well as practicing engineers.Fundamentals of Radar Signal Processing, Second Edition, covers:Introduction to radar systemsSignal modelsPulsed radar data acquisitionRadar waveformsDoppler processingDetection fundamentalsMeasurements and trackingIntroduction to synthetic aperture imagingIntroduction to beamforming and space-time adaptive processing

NASA: The Complete Illustrated History


Michael H. Gorn - 2005
    Authoritatively and engagingly written, this book tells the story of American space exploration from the early 20th century to the present, covering every US space mission ever undertaken, including those of projects Mercury, Gemini and Apollo, and the development of the Space Shuttle.

Sustainable Energy: Choosing Among Options


Jefferson W. Tester - 2005
    This textbook is designed for advanced undergraduate and graduate students as well as others who have an interest in exploring energy resource options and technologies with a view toward achieving sustainability. It clearly presents the trade-offs and uncertainties inherent in evaluating and choosing different energy options and provides a framework for assessing policy solutions. Sustainable Energy includes illustrative examples, problems, references for further reading, and links to relevant Web sites and can be used outside the classroom as a resource for government, industry, and nonprofit organizations. The first six chapters provide the tools for making informed energy choices. estimation, environmental effects, and economic evaluations. Chapters 7-15 review the main energy sources of today and tomorrow, including fossil fuels, nuclear power, biomass, geothermal energy, hydropower, wind energy, and solar energy, examining their technologies, environmental impacts, and economics. The remaining chapters treat energy storage, transmission, and distribution; the electric power sector; transportation; industrial energy usage; commercial and residential buildings; and synergistic complex systems. The book addresses the challenges of integrating diverse factors and the importance for future generations of the energy choices we make today.

The Debian System: Concepts and Techniques


Martin F. Krafft - 2005
    Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development cycle and strict quality control by the developers help Debian to constantly gain popularity, despite its reputation as an operating system just for professionals and hardcore computer hobbyists.The Debian System introduces the concepts and techniques of the Debian operating system, explaining their usage and pitfalls, and illustrating the thinking behind each of the approaches. The book's goal is to give the reader enough insight into the workings of the Debian project and operating system so that they will understand the solutions that have evolved as part of the Debian system over the past decade. While targeted at the well-versed UNIX/Linux administrator, the book can also serve as an excellent resource alongside a standard Linux reference to quickly orient the reader to Debian's unique philosophy and structure. Co-published with Open Source Press, an independent publisher based in Munich that specializes in the field of free and open source software.

Make: Technology on Your Time Volume 02: Technology on Your Time Volume 02


Mark Frauenfelder - 2005
    Everything from home entertainment systems, to laptops, to a host of PDAs is fair game. If there's a way to hack it, tweak it, bend it, or remix it, you will find out about it in MAKE.This isn't another gadget magazine. MAKE focuses on cool things you can do to make technology work the way you want it to. The publication is inspired by our bestselling Hacks series books but with a twist. MAKE is a mook (rhymes with book). We've combined the excitement, unexpectedness, and visual appeal of a magazine with the permanence and in-depth instructiveness of a how-to book.Whether you're a geek or hacker who delights in creating new uses for technology, or a Saturday afternoon tinkerer who loves to get his hands dirty, you'll keep every issue of MAKE on your bookshelf for years to come. This second issue, available in June 2005, includes 224 pages packed with tips and tricks, including:How to build an HDTV recorder and beat the Broadcast FlagPodcasting 101How to ransform abandoned toys into environmental avengersR2-D1Y extreme bot builders at homeThe Atari2600 PC ProjectHow to build a light-seeking robot from an old mouseA Maker Profile on Natalie Jeremijenko and lots more!Every quarter, MAKE will contain a unique set of innovative ideas and creations for a variety of new technologies, including mobile devices, in-car computers, web services, digital media, wireless and home networking, and computer hardware. Visit MAKE's web site: make.oreilly.com.

Eric Sloane's Weather Almanac


Eric Sloane - 2005
    Combining two Sloane books, "Eric Sloane’s Almanac and Weather Forecaster" (1955) and "Folklore of American Weather" (1963), this omnibus is filled with traditional weather sayings and beliefs. In "Eric Sloane’s Weather Almanac," readers will learn forecasting tips such as which winds bring what kinds of weather, how to ""read"" clouds, how to foretell the weather by the moon, and more. Also included is fun climate lore such as old-time sayings about when sap is running and why you should dig your well where lightning has struck. One hundred thirty-five of Sloane’s drawings clarify and enhance the text of this entertaining and informative book by one of the most popular recorders of American history. Before Eric Sloane (1905-1985) became famous for paintings and books, he was one of the top weather experts in the United States and wrote several books on the subject for the U.S. Navy.

MySQL Crash Course


Ben Forta - 2005
    And this book will teach you all you need to know to be immediately productive with MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than you'd have thought possible. Learn how to: Retrieve and sort data Filter data using comparisons, regular expressions, full text search, and much more Join relational data Create and alter tables Insert, update, and delete data Leverage the power of stored procedures and triggers Use views and Cursors Manage transactional processing Create user accounts and manage security via access control Ben Forta is Macromedia's Senior Technical Evangelist, and has almost 20 years of experience in the computer industry in product development, support, training, and product marketing. Ben is the author of the best-selling Sams Teach Yourself SQL in 10 Minutes (now in its third edition, and translated into over a dozen languages), ColdFusion Web Application Construction Kit, and Advanced ColdFusion Development (both published by Que Publishing), Sams Teach Yourself Regular Expressions in 10 Minutes, as well as books on SQL, Flash, JSP, HomeSite, WAP, Windows 2000, and other subjects.

The Body Sculpting Bible for Buns & Legs: Women's Edition


James Villepigue - 2005
    Hugo Rivera and James Villepigue, authors of the widely popular Body Sculpting Bible series, are at it again with a program to tone and tighten your buns, thighs, and legs. This book has something for everyone—from break-in routines for the novice to advanced training for the expert who wants to rise above that fitness plateau. And all of the exercises, fitness programs, and nutritional information have been custom-designed by the experts to sculpt, slim, and strengthen the unique contours of a woman's body. Based on the periodization principle that made the original so effective, the 14-day body sculpting workout for women never stays the same for long and the results just keep on coming.The Body Sculpting Bible for Buns and Legs—Women's Edition includes: • detailed, body-part specific exercises that target the thighs, hips, legs, and buns • meal charts, workout graphs, and fitness plans to help you chart your progress • specialized training tips for pregnant or menopausal womenThe Body Sculpting Bible for Buns and Legs is the essential guide to getting the body of your dreams, fast. For video channel, online support and much more, visit www.getfitnow.com.

Informatica Basica [With CD-ROM]


Francisco J. Martinez - 2005
    Many practical exercises and examples are provided and the accompanying CD contains a glossary, notes, utilities, and software tools.

Fundamentals of Wireless Communication


David Tse - 2005
    This textbook takes a unified view of the fundamentals of wireless communication and explains the web of concepts underpinning these advances at a level accessible to an audience with a basic background in probability and digital communication. Topics covered include MIMO (multi-input, multi-output) communication, space-time coding, opportunistic communication, OFDM and CDMA. The concepts are illustrated using many examples from real wireless systems such as GSM, IS-95 (CDMA), IS-856 (1 x EV-DO), Flash OFDM and UWB (ultra-wideband). Particular emphasis is placed on the interplay between concepts and their implementation in real systems. An abundant supply of exercises and figures reinforce the material in the text. This book is intended for use on graduate courses in electrical and computer engineering and will also be of great interest to practising engineers.

Make: Technology on Your Time Volume 04: Technology on Your Time


Mark Frauenfelder - 2005
    Everything from home entertainment systems, to laptops, to a host of PDAs is fair game. If there's a way to hack it, tweak it, bend it, or remix it, you will find out about it in MAKE.This isn't another gadget magazine. MAKE focuses on cool things you can do to make technology work the way you want it to. The publication is inspired by our bestselling Hacks series books but with a twist. MAKE is a mook (rhymes with book). We've combined the excitement, unexpectedness, and visual appeal of a magazine with the permanence and in-depth instructiveness of a how-to book.Whether you're a geek or hacker who delights in creating new uses for technology, or a Saturday afternoon tinkerer who loves to get his hands dirty, you'll keep every issue of MAKE on your bookshelf for years to come.

Make: Technology on Your Time


Mark Frauenfelder - 2005
    Everything from home entertainment systems, to laptops, to a host of PDAs is fair game. If there's a way to hack it, tweak it, bend it, or remix it, you will find out about it in MAKE.This isn't another gadget magazine. MAKE focuses on cool things you can do to make technology work the way you want it to. The publication is inspired by our bestselling Hacks series books but with a twist. MAKE is a mook (rhymes with book). We ve combined the excitement, unexpectedness, and visual appeal of a magazine with the permanence and in-depth instructiveness of a how-to book.Whether you're a geek or hacker who delights in creating new uses for technology, or a Saturday afternoon tinkerer who loves to get his hands dirty, you'll keep every issue of MAKE on your bookshelf for years to come. Our premier issue, available in February 2005, includes 220 pages packed with tips and tricks, including:how to create a $14 stabilizer for your video camera with readily available household itemshow to use an ordinary kite to take extraordinary professional quality aerial digital photoshow to get rid of that tangle of wires by creating your own 5-in-1 network cablehow to decipher the magnetic stripe on your credit card to find out what your credit card company really knows about you and lots more!Every quarter, MAKE will contain a unique set of innovative ideas and creations for a variety of new technologies, including mobile devices, in-car computers, web services, digital media, wireless and home networking, and computer hardware. Visit MAKE's web site: make.oreilly.com.

Principles of Genetics, Student Companion Guide


D. Peter Snustad - 2005
    This book presents the most up-to-date developments in genetics as well as the fundamental principles. It stresses how genetics is done and provides historical and biographical insights to the people and events that have made genetics a pre-eminent science. The new edition incorporates organizational changes to make the book more modern, including earlier DNA coverage. A new design also highlights numerous practice problems that help reinforce important concepts.* Provides a comprehensive and balanced view of both Classical Mendelian topics and modern Molecular topics.* Incorporates the latest findings from Genomics and Proteomics.* Includes numerous high-quality illustrations with stepped-out art to help readers visualize complex processes.* Offers the analytical tools that readers will need for problem solving.

The Ultimate Guide to Electronic Marketing for Small Business: Low-Cost/High Return Tools and Techniques That Really Work


Tom Antion - 2005
    These tools and techniques can mean the difference between a viable business and closing up shop. But most of what small business owners hear or read about the Internet applies to large businesses with greater resources than their own, or comes from unreliable or shady sources. The Ultimate Guide to Electronic Marketing for Small Business gives the small business owner or aspiring entrepreneur the real-world tools and tactics to market their small business around the world with little investment and even less risk. Full of practical ideas on reaching new customers and increasing sales, this book will make a real difference in the success rate of small businesses and start-ups everywhere.

Dangerous Google - Searching for Secrets


Michał Piotrowski - 2005
    The result isthat lots of confidential data isfreely available on the Internet– just Google for it.This ebook provides many example of Google queries for hacking, providing security-minded administrators information to defend against hacks using Google searches.

John Wesley's Moral Theology: The Quest for God and Goodness


D. Stephen Long - 2005
    Long asserts that the ethical nature of the Wesleyan tradition can be best understood using the frame of moral theology stemming from the virtue tradition, particularly the work of Thomas Aquinas. This recognizes that the gathering of the faithful for the purpose of seeking holiness is the public voice of the church. Because we squeezed the Wesleyan tradition in the academic discipline of philosophical and applied ethics, we distorted our tradition. This distortion led us into our current ethical impasse, particularly with money, war and peace, homosexuality, and technology.An excerpt from the Circuit Rider review: "In John Wesley's Moral Theology, D. Stephen Long offers a radical proposal: By letting Wesley be Wesley in his context and thus being out of step with ours, Wesley actually has more to say to us in our postmodern context. Here, our problem with making him relevant for today is implied in the difference between "ethics" and "moral theology." As a "moral theologian," Wesley believed that doing and knowing what is good can only be achieved by being united with Christ. In other words, the Good and the True cannot be known outside of God. Thus, there is no separation between ethics and theology since the former is only intelligible in the light of the latter." (Click here to read the entire review.)

The Web Hosting Manager


Christoph Puetz - 2005
    This non-technical book guides the reader from the very beginning of starting a web hosting business to highly sophisticated marketing information that makes this book invaluable for the beginner and the pro.

Murderous Medicine: Nazi Doctors, Human Experimentation, and Typhus


Naomi Baumslag - 2005
    Despite advances in public health measures to control and prevent typhus outbreaks, German doctors, fueled by their racist ideology and their medieval approach to the disease, used the disease as a form of biological warfare against Jews, Slavs, and gypsies. Jewish hospitals in ghettos were burned--along with patients and staff--if typhus was present. In concentration camps, even suspected typhus cases were killed in the gas chambers or through intracardiac injections. Typhus vaccines were tested on prisoners deliberately infected with typhus. Only a handful of doctors were ever prosecuted for their crimes.Against all odds, Jewish health providers struggled to avoid the worst through innovative steps to save lives. Despite the removal of their equipment, drugs, and other resources, they organized health care and sanitary hygienic measures. Doctors were forced to conceal cases, falsify diagnoses and cause of death in order to save lives. This important study explores the role of the International Red Cross in typhus epidemics during and after World War I and World War II. It details the widespread complicity of foreign companies in the Nazi typhus research. Finally, the author stresses the importance of monitoring and holding accountable the medical profession, researchers, and drug companies that continue to invest in research on biological agents as weapons of war.

Electronic Brains: Stories from the Dawn of the Computer Age


Mike Hally - 2005
    Within a relatively short period of time, we've managed to put enormous computing power in offices and homes around the globe. But before there was an IBM computer, before there were laptops and personal PCs, there were small independent teams of pioneers working on the development of the very first computer. Scattered around the globe and ranging in temperament and talent, they forged the future in basement labs, backyard, workshops, and old horse barns.Tracing the period just after World War II when the first truly modern computers were developed, Electronic Brains chronicles the escapades of the world's first techies. Some of the initial projects are quite famous and well known, such as LEO, the Lyons Electronic Office, which was developed by the catering company J. Lyons & Co. in London in the 1940s. Others are a bit more arcane, such as the ABC, which was built in a basement at Iowa State College and was abandoned to obscurity at the beginning of WWII. And then - like the tale of the Rand 409 which wss constructed in a barn in Connecticut under the watchful eye of a stuffed moose - there are the stories that are virtually unknown. All combine to create a fascinating history of a now-ubiquitous technology.Relying on extensive interviews from surviving members of the original teams of hardware jockeys, author Mike Hally recreates the atmosphere of the early days of computing. Rich with provocative and entertaining descriptions, we are introduced go the many eccentric, obsessive, and fiercely loyal men and women who laid the foundations for the computerized world in which we now live. As the acronyms fly fast and furious - UNIVAC, CSIRAC, and MESM, to name just a few - Electronic Brains provides a vivid sense of time, place, and science.

Airbus A380: Superjumbo of the 21st Century


Guy Norris - 2005
    Tensions run high as airlines push for add-ons, manufacturers fret over weight and performance standards, and designers make the mundane but critical decisions over such details as seats and food-service carts that may well determine the success of this $13 billion project. This book provides a complete picture of the Airbus A380, as well as a revealing behind-the-scenes look at the development of the biggest commercial aircraft ever built. With 200 color photos, Airbus A380: Superjumbo of the 21st Century takes readers through the drama of the A380 project, introducing all the key players and unraveling the controversies surrounding its development, from battles over construction materials and on-board technologies to alleged mudslinging by Boeing and other competitors.

Penetration Tester's Open Source Toolkit [With CDROM]


Johnny Long - 2005
    A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools

Microsoft Access Data Analysis


Michael Alexander - 2005
    The site also includes templates and tools to get you started.

Thinking Recursively with Java


Eric S. Roberts - 2005
    published Thinking Recursively by Eric Roberts. Since its publication in 1986, Thinking Recursively has become a classic in a field in which books quickly become obsolete. By focusing on effective problem-solving strategies that enable students to think recursively, this text has helped many students over the conceptual hurdle that recursion so often represents. Moreover, by including many more examples and exercises than typical, Thinking Recursivelymakes it possible for students to master recursive techniques. To celebrate the 20th anniversary of its initial publication, John Wiley and Sons is publishing Thinking Recursively with Java, making the book even more relevant to today's students. Course Hierarchy: May fit a variety of Java programming courses as a supplement at the introductory or intermediate levels or serve as a core text in intermediate or advanced level programming courses.

A Pragmatic Guide to Business Process Modelling


Jon Holt - 2005
    It is considered a core competency for anyone involved in managing change and Jon Holt’s expert text explores all the main aspects including process analysis and process documentation. Applying the standard modelling notation (UML), the result is a detailed, step-by-step guide to the entire modelling process.

Firefox Secrets


Cheah Chu Yeow - 2005
    Firefox Secrets will teach you how to get the most from Mozilla, including how to find and use all the hidden features, extensions available to you. You'll learn:Ways to ease the transition from Internet ExplorerA way to setup multiple "homepages" when you launch your browserRead RSS feeds from within Firefox using a free extensionWhere to download a new and less obtrusive "Download Manager"The best "must-have" extensions to download as well as the "fun" onesTwo different ways to speed up Firefox downloads with prefetcher and pipeliningFirefox's secret features for Web DevelopersAnd much, much more!Firefox Secrets is the ultimate guide to the Web Browser that major magazines, newspapers and even Microsoft's own "Slate.com" website are recommending as the ultimate replacement to Internet Explorer.

Roaming in Wireless Networks


Shahid Siddiqui - 2005
    Wireless service providers make approximately 30% of their operating profit from roaming. But despite being a major source of income, roaming suffers from a number of technological problems in the handoff between networks. Signal strength is wildly variable, calls are frequently dropped, and quality of service is poor. Based upon training courses the author teaches at Agilent and Hewlett-Packard, this is the first book to give communications engineers the know-how to faultlessly design and manage roaming services.

Rebirth of American Industry: A Study of Lean Management


William H. Waddell - 2005
    GM and Ford were the world leaders in automobile manufacturing, the richest companies in the world. What happened? Could it have been prevented? And have they, and we, learned a very important lesson to not repeat the mistakes from past? The very purpose of this book is to examine what were the principle things that did go wrong and to give modern managers specific guidelines to think about today to be internationally competitive.

Podcasting Pocket Guide


Kirk McElhearn - 2005
    Podcasting Pocket Guide is a non-technical guide for the non-geek who wants in on this revolutionary new online medium--for those interested in enjoying the best podcasts or producing them.While podcasts seem like Internet "radio programs," they are definitely not radio. And that's a very good thing for people like you with something to say. Radio waves, after all, are heavily regulated, which means you can't say whatever you want on them (in fact, most of you can't say anything on them, assuming you don't happen to be DJs). But anyone who can make an MP3 recording, host it on a web site, and publish a "feed" for it can be a podcaster. And anyone who wants access to opinions and ideas that you won't get on the radio can find them on a podcast.Small enough to fit in your pocket, the portable and affordable Podcasting Pocket Guide shows you how to tune into the best podcasts and download them to your favorite portable device so you can listen to them wherever and whenever you want. This handy reference even includes a listener's guide with reviews of some of the most interesting and unusual podcasts available today. From unique views on current events to music you'd never hear otherwise to soundseeing tours that take you all over the world, there's something for everyone on virtually every conceivable topic.For aspiring podcasters, Podcasting Pocket Guide introduces you to the tools and techniques you'll need to make and publish podcasts with the most basic of equipment: a computer, a microphone, and some free software. It includes practical tips and how-tos for creating, recording, editing, and uploading your own, professional-quality podcast. Once you've made that first recording, you can publish it online, get it listed, and start obsessing over the size of your audience!

Vehicle Propulsion Systems: Introduction to Modeling and Optimization


Lino Guzzella - 2005
    The main emphasis is on the analysis and minimization of the fuel and energy consumption. Most approaches to this problem enhance the complexity of the vehicle system by adding components such as electrical motors or storage devices. Such a complex system can only be designed by means of mathematical models. This text gives an introduction to the modeling and optimization problems typically encountered when designing new propulsion systems for passenger cars. It is intended for persons interested in the analysis and optimization of classical and novel vehicle propulsion systems. Its focus lies on the control-oriented mathematical description of the physical processes and on the model-based optimization of the system structure and of the supervisory control algorithms. This text has evolved from a lecture series at ETH Zurich. Prerequisites are general engineering topics and a first course in optimal control theory.

When Computers Were Human


David Alan Grier - 2005
    These workers were neither calculating geniuses nor idiot savants but knowledgeable people who, in other circumstances, might have become scientists in their own right. When Computers Were Human represents the first in-depth account of this little-known, 200-year epoch in the history of science and technology.Beginning with the story of his own grandmother, who was trained as a human computer, David Alan Grier provides a poignant introduction to the wider world of women and men who did the hard computational labor of science. His grandmother's casual remark, "I wish I'd used my calculus," hinted at a career deferred and an education forgotten, a secret life unappreciated; like many highly educated women of her generation, she studied to become a human computer because nothing else would offer her a place in the scientific world.The book begins with the return of Halley's comet in 1758 and the effort of three French astronomers to compute its orbit. It ends four cycles later, with a UNIVAC electronic computer projecting the 1986 orbit. In between, Grier tells us about the surveyors of the French Revolution, describes the calculating machines of Charles Babbage, and guides the reader through the Great Depression to marvel at the giant computing room of the Works Progress Administration. When Computers Were Human is the sad but lyrical story of workers who gladly did the hard labor of research calculation in the hope that they might be part of the scientific community. In the end, they were rewarded by a new electronic machine that took the place and the name of those who were, once, the computers.

The Finite Element Method for Solid and Structural Mechanics


O.C. Zienkiewicz - 2005
    Covering small and large deformation behaviour of solids and structures, it is an essential book for engineers and mathematicians. The new edition is a complete solids and structures text and reference in its own right and forms part of the world-renowned Finite Element Method series by Zienkiewicz and Taylor.New material in this edition includes separate coverage of solid continua and structural theories of rods, plates and shells; extended coverage of plasticity (isotropic and anisotropic); node-to-surface and 'mortar' method treatments; problems involving solids and rigid and pseudo-rigid bodies; and multi-scale modelling.

Accidental Techie: Supporting, Managing, and Maximizing Your Nonprofit's Technology


Sue Bennett - 2005
    But now, somehow, all technology resources have become your responsibility! The Accidental Techie shows you how to create a support system that will help your organization use technology more effectively and make your day-to-day life less hectic. Step-by-step guidance to creating an effective support system This hands-on guide walks you through five projects that, when completed, will give you a comprehensive and usable support system for conducting a technology inventory, assessing and supporting staff, assessing and buying technology, protecting your organization from disasters and data loss, and managing your role. You don't have to tackle the projects all at once or in any particular order. Dive in where it makes sense for you. ""Techie Tools"" make this guide even more useful You'll find ready-to-use templates, worksheets, and sample policies; 135 resources on topics such as funding, discussion groups, application service providers, web site development, and donor management software; a security policy checklist; steps for creating a database that gives you the reports you need; and a glossary of terms every techie should know. How to get technology funding A special chapter on funding reveals five questions most funders ask to judge technology requests, and gives you tips for creating a compelling request. Build management support for your work Many accidental techies face the challenge of influencing major organizational policies and procedures without real authority to do so. Board members and managers can use this book to understand and support your work. Ultimately, better managed technology leads to better services. Whether you're new to all this or a veteran, The Accidental Techie if your ally. Use it and start making your life easier today

Estimating Software-Intensive Systems: Projects, Products, and Processes


Richard D. Stutzke - 2005
    This book explains how to size software, identify cost components, calculate the associated costs, and set a competitive price. An accompanying CD-ROM contains templates, supplemental notes, and spreadsheets.

Mathematica for Theoretical Physics: Electrodynamics, Quantum Mechanics, General Relativity, and Fractals


Gerd Baumann - 2005
    Class-tested textbook that shows readers how to solve physical problems and deal with their underlying theoretical concepts while using Mathematica(R) to derive numeric and symbolic solutions.Delivers dozens of fully interactive examples for learning and implementation, constants and formulae can readily be altered and adapted for the user's purposes.New edition offers enlarged two-volume format suitable to courses in mechanics and electrodynamics, while offering dozens of new examples and a more rewarding interactive learning environment.

PSTricks: Graphics and PostScript for TeX and LaTeX


Herbert Voss - 2005
    As a result TeX itself provides only basic graphics support, and while the introduction of LaTeX improved matters, something more was needed. PSTricks addresses this by providing a very wide range of graphics facilities - from simple lines and curves, to 3D images, trees, knots, and charts, etc., with support for transformations, overlays and more - to form a complete graphics environment.This book is a comprehenseive reference guide to PSTricks. It contains hundreds of examples (64 pages in colour), with the source code available online.Intended audience -Mathematicians, engineers, scientists, statisticians & economists -Graphic artists -College staff and students -Book and journal publishers

When States Kill: Latin America, the U.S., and Technologies of Terror


Cecilia Menjívar - 2005
    As the chapters in this book illustrate, these technological transfers have taken various forms, including the training of Latin American military personnel in surveillance and torture and the provision of political and logistic support for campaigns of state terror. The human cost for Latin America has been enormous—thousands of Latin Americans have been murdered, disappeared, or tortured, and whole communities have been terrorized into silence. Organized by region, the essays in this book address the topic of state-sponsored terrorism in a variety of ways. Most take the perspective that state-directed political violence is a modern development of a regional political structure in which U.S. political interests weigh heavily. Others acknowledge that Latin American states enthusiastically received U.S. support for their campaigns of terror. A few see local culture and history as key factors in the implementation of state campaigns of political violence. Together, all the essays exemplify how technologies of terror have been transferred among various Latin American countries, with particular attention to the role that the United States, as a “strong” state, has played in such transfers.

Robots: From Science Fiction to Technological Revolution


Daniel Ichbiah - 2005
    A visual survey of the scientific developments and cultural significance of robots documents the history of automatons, androids, and other forms of artificial intelligence, both of the fictional and real-world arenas, in a volume that features interviews with scientists, doctors, toy creators, science-fiction writers, and more.

Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization


Ramesh Kaza - 2005
    It also contains predesigned questionnaires and PDIOO assistance tools that help you determine the requirements of each phase of the PDIOO cycle.

Virtual Music: How the Web Got Wired for Sound


William Duckworth - 2005
    Also includes a 4-page color insert.

Food in World History


Jeffrey M. Pilcher - 2005
    Providing a comparative and comprehensive study of culinary cultures and consumption throughout the world from ancient times to present day, this book examines the globalization of food and explores the political, social and environmental implications of our changing relationship with food.Including numerous case studies from diverse societies and periods, Food in World History examines and focuses on:how food was used to forge national identities in Latin America the influence of Italian and Chinese Diaspora on the US and Latin America food culture how food was fractured along class lines in the French bourgeois restaurant culture and working class cafes the results of state intervention in food production how the impact of genetic modification and food crises has affected the relationship between consumer and product.This concise and readable survey not only presents a simple history of food and its consumption, but also provides a unique examination of world history itself.

Family Survival in an X-rated World: Guarding Your Heart and Protecting Your Home


Steve Rogers - 2005
    No where is this more acutely felt than in the breakdown of the American family. Immorality of all shapes and sizes is available, affordable and is available anonymously to every household with a TV or computer. Every family needs an action plan to protect the heart of every member.Every father, mother, brother, and sister needs to make a faith covenant to keep their hearts and lives pure. Respected and beloved Bible teacher Adrian Rogers will equip you to protect not only your home but also your heart and the hearts of your loved ones from the tidal wave of decadence descending upon our neighborhoods today.

Discontinuous Finite Elements in Fluid Dynamics and Heat Transfer


Ben Q. Li - 2005
    Certain unique features of the method have made it attractive as an alternative for other popular methods such as finite volume and finite elements in thermal fluids engineering analyses. This book is written as an introductory textbook on the discontinuous finite element method for senior undergraduate and graduate students in the area of thermal science and fluid dynamics. It also can be used as a reference book for researchers and engineers who intend to use the method for research in computational fluid dynamics and heat transfer. A good portion of this book has been used in a course for computational fluid dynamics and heat transfer for senior undergraduate and first year graduate students. It also has been used by some graduate students for self-study of the basics of discontinuous finite elements. This monograph assumes that readers have a basic understanding of thermodynamics, fluid mechanics and heat transfer and some background in numerical analysis. Knowledge of continuous finite elements is not necessary but will be helpful. The book covers the application of the method for the simulation of both macroscopic and micro/nanoscale fluid flow and heat transfer phenomena.

Mobile Technologies of the City


Mimi Sheller - 2005
    Emergent practices of physical, informational and communicational mobility are reconfiguring patterns of movement, co-presence, social exclusion and security across many urban contexts. This book brings together a carefully selected group of innovative case studies of these mobile technologies of the city, tracing the emergence of both new socio-technical practices of the city and of a new theoretical paradigm for mobilities research.

Covert And Overt: Recollecting And Connecting Intelligence Service And Information Science


Ben-ami Lipetz - 2005
    Skillfully edited by Robert V. Williams and Ben-Ami Lipetz, the book features contributions by intelligence professionals and technologists from a range of U.S. and British agencies and armed services. The book begins by examining the pivotal strides to utilize technology in the gathering and dissemination of government/military intelligence during World War II. Next, it traces the evolution of the relationship between spymasters, computers, and systems developers through the years of the Cold War-a period notable for the parallel development of high-tech spyware and powerful new systems for encoding, decoding, storing, and manipulating intelligence data. This scholarly work will be welcomed by any researcher, historian, or intelligence professional interested in the vital conjunction of information technology and covert intelligence.

The First Computers


Guy de la Bédoyère - 2005
    Readers will meet the scientists who unlocked the secrets of subatomic particles, explained the relationship between time and space, and cracked the code of life itself. They will visit the laboratories where medical experts discovered how to combat diseases and develop life-saving antidotes, and follow the metamorphosis of computers as they progressed from simple counting machines to creators of virtual reality and beyond. Each title features fascinating focus boxes and a wealth of visual aids that serve to illustrate and clarify the reader-friendly text.

Williams-Sonoma Collection: Fruit Dessert


Carolyn Beth Weil - 2005
    Tender gingered apricots baked with a crisp almond topping. Sweet, juicy blackberries concealed inside a flaky pastry turnover. Whether stewed with spices or simply dusted with powdered sugar as the topping for a tart, almost every kind of fruit can be transformed into a delectable dessert. Williams-Sonoma Collection Fruit Dessert offers more than 40 favorite recipes, from homey pies and cobblers to elegant tarts and sorbets. For the perfect end to a dinner party, serve your guests an exotic coconut cake with fresh mango or homemade strawberry ice cream enriched with crème fraîche. When you are short on time, whip up a batch of easy baked apples or a warm berry compote to serve alongside ice cream or pound cake. And during the holidays, indulge yourself with a homemade pumpkin pie or apple crisp. Full-color photographs and helpful sidebars on key ingredients and techniques accompany each recipe, so you can successfully picture and prepare your dish of choice. An informative basics section at the back of the book offers tips on how to select fruit at its peak of ripeness and perfect your tart dough and pie crust. Whether you are looking for an impressive dessert or a simple dish that takes just minutes to prepare, you will find no shortage of inspiration in these pages.

Linux Firewalls


Steve Suehring - 2005
    Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls.

Apple Training Series: Mac OS X System Administration Reference, Volume 1


Schoun Regan - 2005
    It will teach the reader how to install and configure machines; architect and maintain networks; enable, customize, tune, and troubleshoot a wide range of services; and integrate Mac OS X, Mac OS X Server, and other Apple technologies within a networked environment.

Computer Networking: Internet Protocols in Action


Jeanna Matthews - 2005
    They give computer science students realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Using the latest version of the open source program Ethereal, the reader opens packet trace files from the CD and follows the text to perform the exercises, gaining a thorough understanding of the material in the best way possible--by seeing it in action. This approach also benefits the instructor, who is spared the time-consuming tasks of maintaining a laboratory and taking traces. It can even relieve the anxiety system administrators have about students collecting traces on campus networks!