Best of
Technology

2009

But How Do It Know? - The Basic Principles of Computers for Everyone


J. Clark Scott - 2009
    Its humorous title begins with the punch line of a classic joke about someone who is baffled by technology. It was written by a 40-year computer veteran who wants to take the mystery out of computers and allow everyone to gain a true understanding of exactly what computers are, and also what they are not. Years of writing, diagramming, piloting and editing have culminated in one easy to read volume that contains all of the basic principles of computers written so that everyone can understand them. There used to be only two types of book that delved into the insides of computers. The simple ones point out the major parts and describe their functions in broad general terms. Computer Science textbooks eventually tell the whole story, but along the way, they include every detail that an engineer could conceivably ever need to know. Like Momma Bear's porridge, But How Do It Know? is just right, but it is much more than just a happy medium. For the first time, this book thoroughly demonstrates each of the basic principles that have been used in every computer ever built, while at the same time showing the integral role that codes play in everything that computers are able to do. It cuts through all of the electronics and mathematics, and gets right to practical matters. Here is a simple part, see what it does. Connect a few of these together and you get a new part that does another simple thing. After just a few iterations of connecting up simple parts - voilà! - it's a computer. And it is much simpler than anyone ever imagined. But How Do It Know? really explains how computers work. They are far simpler than anyone has ever permitted you to believe. It contains everything you need to know, and nothing you don't need to know. No technical background of any kind is required. The basic principles of computers have not changed one iota since they were invented in the mid 20th century. "Since the day I learned how computers work, it always felt like I knew a giant secret, but couldn't tell anyone," says the author. Now he's taken the time to explain it in such a manner that anyone can have that same moment of enlightenment and thereafter see computers in an entirely new light.

Pro Git


Scott Chacon - 2009
    It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.

Perfecting Sound Forever: An Aural History of Recorded Music


Greg Milner - 2009
    Today, the equation is reversed. Whereas Edison proposed that a real performance could be rebuilt with absolute perfection, Pro Tools and digital samplers now allow musicians and engineers to create the illusion of performances that never were. In between lies a century of sonic exploration into the balance between the real and the represented.Tracing the contours of this history, Greg Milner takes us through the major breakthroughs and glorious failures in the art and science of recording. An American soldier monitoring Nazi radio transmissions stumbles onto the open yet revolutionary secret of magnetic tape. Japanese and Dutch researchers build a first-generation digital audio format and watch as their "compact disc" is marketed by the music industry as the second coming of Edison yet derided as heretical by analog loyalists. The music world becomes addicted to volume in the nineties and fights a self-defeating "loudness war" to get its fix.From Les Paul to Phil Spector to King Tubby, from vinyl to pirated CDs to iPods, Milner's Perfecting Sound Forever pulls apart musical history to answer a crucial question: Should a recording document reality as faithfully as possible, or should it improve upon or somehow transcend the music it records? The answers he uncovers will change the very way we think about music.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

Web Analytics 2.0: The Art of Online Accountability & Science of Customer Centricity [With CDROM]


Avinash Kaushik - 2009
    "Web Analytics 2.0" presents a new framework that will permanently change how you think about analytics. It provides specific recommendations for creating an actionable strategy, applying analytical techniques correctly, solving challenges such as measuring social media and multichannel campaigns, achieving optimal success by leveraging experimentation, and employing tactics for truly listening to your customers. The book will help your organization become more data driven while you become a super analysis ninja Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Apprenticeship Patterns: Guidance for the Aspiring Software Craftsman


Dave Hoover - 2009
    To grow professionally, you also need soft skills and effective learning techniques. Honing those skills is what this book is all about. Authors Dave Hoover and Adewale Oshineye have cataloged dozens of behavior patterns to help you perfect essential aspects of your craft. Compiled from years of research, many interviews, and feedback from O'Reilly's online forum, these patterns address difficult situations that programmers, administrators, and DBAs face every day. And it's not just about financial success. Apprenticeship Patterns also approaches software development as a means to personal fulfillment. Discover how this book can help you make the best of both your life and your career. Solutions to some common obstacles that this book explores in-depth include:Burned out at work? "Nurture Your Passion" by finding a pet project to rediscover the joy of problem solving.Feeling overwhelmed by new information? Re-explore familiar territory by building something you've built before, then use "Retreat into Competence" to move forward again.Stuck in your learning? Seek a team of experienced and talented developers with whom you can "Be the Worst" for a while. "Brilliant stuff! Reading this book was like being in a time machine that pulled me back to those key learning moments in my career as a professional software developer and, instead of having to learn best practices the hard way, I had a guru sitting on my shoulder guiding me every step towards master craftsmanship. I'll certainly be recommending this book to clients. I wish I had this book 14 years ago!" -Russ Miles, CEO, OpenCredo

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

Racing the Beam: The Atari Video Computer System


Nick Montfort - 2009
    The Atari VCS was affordable and offered the flexibility of changeable cartridges. Nearly a thousand of these were created, the most significant of which established new techniques, mechanics, and even entire genres. This book offers a detailed and accessible study of this influential video game console from both computational and cultural perspectives.Studies of digital media have rarely investigated platforms--the systems underlying computing. This book (the first in a series of Platform Studies) does so, developing a critical approach that examines the relationship between platforms and creative expression. Nick Montfort and Ian Bogost discuss the Atari VCS itself and examine in detail six game cartridges: Combat, Adventure, Pac-Man, Yars' Revenge, Pitfall!, and Star Wars: The Empire Strikes Back. They describe the technical constraints and affordances of the system and track developments in programming, gameplay, interface, and aesthetics. Adventure, for example, was the first game to represent a virtual space larger than the screen (anticipating the boundless virtual spaces of such later games as World of Warcraft and Grand Theft Auto), by allowing the player to walk off one side into another space; and Star Wars: The Empire Strikes Back was an early instance of interaction between media properties and video games. Montfort and Bogost show that the Atari VCS--often considered merely a retro fetish object--is an essential part of the history of video games.

Decoding the Heavens: A 2,000-Year-Old Computer and the Century-Long Search to Discover Its Secrets


Jo Marchant - 2009
    Now, using advanced imaging technology, scientists have solved the mystery of its intricate workings. Unmatched in complexity for a thousand years, the mechanism functioned as the world's first analog computer, calculating the movements of the sun, moon, and planets through the zodiac. In Decoding the Heavens, Jo Marchant details for the first time the hundred-year quest to decode this ancient computer. Along the way she unearths a diverse cast of remarkable characters--ranging from Archimedes to Jacques Cousteau--and explores the deep roots of modern technology, not only in ancient Greece, but in the Islamic world and medieval Europe. At its heart, this is an epic adventure story, a book that challenges our assumptions about technology development through the ages while giving us fresh insights into history itself.

Understanding Cryptography: A Textbook For Students And Practitioners


Christof Paar - 2009
    Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

NASA Apollo 11 Manual: 1969


Christopher Riley - 2009
    The Apollo 11 mission that carried him and his two fellow astronauts on their epic journey marked the successful culmination of a quest that, ironically, had begun in Nazi Germany thirty years before. This is the story of the Apollo 11 mission and the 'space hardware' that made it all possible. Author Chris Riley looks at the evolution and design of the mighty Saturn V rocket, the Command and Service Modules, and the Lunar Module. He also describes the space suits worn by the crew, with their special life support systems. Launch procedures are described, 'flying' the Saturn V, navigation, course correction 'burns', orbital rendezvous techniques, flying the LEM, moon landing, moon walk, take-off from the moon, and earth re-entry procedure. Includes performance data, fuels, biographies of Armstrong, Aldrin and Collins, Gene Kranz and Werner von Braun. Detailed appendices cover all of the Apollo missions, with full details of crews, spacecraft names and logos, mission priorities, moon landing sites, and the Lunar Rover.

Microsoft SQL Server 2008 Internals


Kalen Delaney - 2009
    Whether database developer, architect, or administrator, you’ll gain the deep knowledge you need to exploit key architectural changes—and capture the product’s full potential. Discover how SQL Server works behind the scenes, including:What happens internally when SQL Server builds, expands, shrinks, and moves databases How to use event tracking—from triggers to the Extended Events Engine Why the right indexes can drastically reduce your query execution time How to transcend normal row-size limits with new storage capabilities How the Query Optimizer operates Multiple techniques for troubleshooting problematic query plans When to force SQL Server to reuse a cached query plan—or create a new one What SQL Server checks internally when running DBCC How to choose among five isolation levels and two concurrency models when working with multiple concurrent users

Inside Microsoft SQL Server 2008: T-SQL Programming


Itzik Ben-Gan - 2009
    Database developers and administrators get best practices, expert techniques, and code samples to master the intricacies of this programming language—solving complex problems with real-world solutions.Discover how to:Work with T-SQL and CLR user-defined functions, stored procedures, and triggers. Handle transactions, concurrency, and error handling. Efficiently use temporary objects, including temporary tables, table variables, and table expressions. Evaluate when to use set-based programming techniques and when to use cursors. Work with dynamic SQL in an efficient and secure manner. Treat date- and time-related data in a robust manner. Develop CLR user-defined types and learn about temporal support in the relational model. Use XML and XQuery and implement a dynamic schema solution. Work with spatial data using the new geometry and geography types and spatial indexes. Track access and changes to data using extended events, SQL Server Audit, change tracking, and change data capture. Use Service Broker for controlled asynchronous processing in database applications. All the book’s code samples will be available for download from the companion Web site.

Inside Microsoft SQL Server 2008: T-SQL Querying


Itzik Ben-Gan - 2009
    Deepen your understanding of architecture and internals—and gain practical approaches and advanced techniques to optimize your code’s performance.Discover how to:- Move from procedural programming to the language of sets and logic- Optimize query tuning with a top-down methodology- Assess algorithmic complexity to predict performance- Compare data-aggregation techniques, including new grouping sets- Manage data modification—insert, delete, update, merge—for performance- Write more efficient queries against partitioned tables- Work with graphs, trees, hierarchies, and recursive queries- Plus—Use pure-logic puzzles to sharpen your problem-solving skills

Refactoring: Ruby Edition, Adobe Reader


Jay Fields - 2009
    What’s more, they can do it one step at a time, through a series of simple, proven steps. Now, there’s an authoritative and extensively updated version of Martin Fowler’s classic refactoring book that utilizes Ruby examples and idioms throughout–not code adapted from Java or any other environment.The authors introduce a detailed catalog of more than 70 proven Ruby refactorings, with specific guidance on when to apply each of them, step-by-step instructions for using them, and example code illustrating how they work. Many of the authors’ refactorings use powerful Ruby-specific features, and all code samples are available for download. Leveraging Fowler’s original concepts, the authors show how to perform refactoring in a controlled, efficient, incremental manner, so you methodically improve your code’s structure without introducing new bugs. Whatever your role in writing or maintaining Ruby code, this book will be an indispensable resource.This book will help you Understand the core principles of refactoring and the reasons for doing it Recognize “bad smells” in your Ruby code Rework bad designs into well-designed code, one step at a time Build tests to make sure your refactorings work properly Understand the challenges of refactoring and how they can be overcome Compose methods to package code properly Move features between objects to place responsibilities where they fit best Organize data to make it easier to work with Simplify conditional expressions and make more effective use of polymorphism Create interfaces that are easier to understand and use Generalize more effectively Perform larger refactorings that transform entire software systems and may take months or years Successfully refactor Ruby on Rails code

Logic Pro 9 and Logic Express 9


David Nahmani - 2009
    Veteran music producer David Nahmani's step-by-step, instructions teach you everything from basic music creation to advanced production techniques using Logic's software synthesizers, samplers, and digital signal processors. Using the book's DVD files and either Logic Pro 9 or Logic Express 9, you'll begin making music in the first lesson. Whether you're looking to use your computer as a digital recording studio, create musical compositions, or transfer that song in your head into music you can share, this comprehensive book/DVD combo will show you how. DVD-ROM includes lesson and media files Focused lessons take you step-by-step through professional, real-world projects Accessible writing style puts an expert instructor at your side Ample illustrations and keyboard shortcuts help you master techniques fast Lesson goals and time estimates help you plan your time Chapter review questions summarize what you've learned and prepare you for the Apple Certifi ed Pro Exam

Beginning HTML, XHTML, CSS, and JavaScript


Jon Duckett - 2009
    While learning these technologies, you will discover coding practices such as writing code that works on multiple browsers including mobile devices, how to use AJAX frameworks to add interactivity to your pages, and how to ensure your pages meet accessible requirements.Packed with real-world examples, the book not only teaches you how to write Web sites using XHTML, CSS and JavaScript, but it also teaches you design principles that help you create attractive web sites and practical advice on how to make web pages more usable. In addition, special checklists and appendices review key topics and provide helpful references that re-enforce the basics you've learned.Serves as an ideal beginners guide to writing web pages using XHTML Explains how to use CSS to make pages more appealing and add interactivity to pages using JavaScript and AJAX frameworks Share advice on design principles and how to make pages more attractive and offers practical help with usability and accessibility Features checklists and appendices that review key topics This introductory guide is essential reading for getting started with using XHTML, CSS and JavaScript to create exciting and compelling Web sites.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Introduction to Rocket Science and Engineering


Travis S. Taylor - 2009
    It covers an array of fields, from advanced mathematics, chemistry, and physics to logistics, systems engineering, and politics.The text begins with a discussion on the discovery and development of rockets as well as the basic principles governing rockets and rocket science. It explains why rockets are needed from economic, philosophical, and strategic standpoints and looks at why the physics of the universe forces us to use rockets to complete certain activities. Exploring how rockets work, the author covers the concepts of thrust, momentum, impulse, and the rocket equation, along with the rocket engine, its components, and the physics involved in the generation of the propulsive force. He also presents several different types of rocket engines and discusses the testing of rocket components, subsystems, systems, and complete products. The final chapter stresses the importance of rocket scientists and engineers to think of the unusual, unlikely, and unthinkable when dealing with the complexities of rocketry.Taking students through the process of becoming a rocket scientist or engineer, this text supplies a hands-on understanding of the many facets of rocketry. It provides the ideal foundation for students to continue on their journey in rocket science and engineering.

Mastering VMware vSphere 4


Scott Lowe - 2009
    Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.

My First Book of Knots


Berndt Sundsten - 2009
    Here is a children's picture book that will help parent and child learn together. In My First Book of Knots, you'll learn how to tie knots you can use in fishing, camping, ranching, farming, and more. You'll learn how Santa Claus ties up his sack full of presents and how to tie a knot that will make it easy to carry heavy objects. Every step of each knot is drawn out for you and includes clearly written instructions. After you read this book, you can save the day with a square knot and wow your friends with a double figure eight bend.

Superconductivity: A Very Short Introduction


Stephen J. Blundell - 2009
    Outlining the fascinating history of how superconductivity was discovered, and the race to understand its many mysterious and counter-intuitive phenomena, Stephen Blundell explains in accessible terms the theories that have been developed to explain it, and how they have influenced other areas of science, including the Higgs boson of particle physics and ideas about the early Universe. This Very Short Introduction examines the many strange phenomena observed in superconducting materials, the latest developments in high-temperature superconductivity, the potential of superconductivity to revolutionize the physics and technology of the future, and much more. It is a fascinating detective story, offering invaluable insights into some of the deepest and most beautiful ideas in physics today.About the Series: Combining authority with wit, accessibility, and style, Very Short Introductions offer an introduction to some of life's most interesting topics. Written by experts for the newcomer, they demonstrate the finest contemporary thinking about the central problems and issues in hundreds of key topics, from philosophy to Freud, quantum theory to Islam.

The Quest for Artificial Intelligence: A History of Ideas and Achievements


Nils J. Nilsson - 2009
    This book traces the history of the subject, from the early dreams of eighteenth-century (and earlier) pioneers to the more successful work of today's AI engineers. AI is becoming more and more a part of everyone's life. The technology is already embedded in face-recognizing cameras, speech-recognition software, Internet search engines, and health-care robots, among other applications. The book's many diagrams and easy-to-understand descriptions of AI programs will help the casual reader gain an understanding of how these and other AI systems actually work. Its thorough (but unobtrusive) end-of-chapter notes containing citations to important source materials will be of great use to AI scholars and researchers. This book promises to be the definitive history of a field that has captivated the imaginations of scientists, philosophers, and writers for centuries.

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Cultural Studies


Kevin A. Gonzalez - 2009
    Blending traditional forms with content in unexpected ways, these are poems that show a tough exterior as well as the vulnerability beneath the front, that feed off their apparent hypocrisy while casting it in the lead role. Ultimately, they are poems that build truths by amassing contradictions, whipping us along on engaging rhythmic journeys that often wind up surprisingly back where they began."

Return to the Little Kingdom: Steve Jobs, the Creation of Apple, and How It Changed the World


Michael Moritz - 2009
    Now, completely revised and expanded, Return to the Little Kingdom is the definitive biography of Apple and its founders from the very beginning Moritz brings readers inside the childhood homes of Jobs and Wozniak and records how they dropped out of college and founded Apple in 1976. He follows the fortunes of the company through the mid-1980s, and in new material, tracks the development of Apple to the present and offers an insider's profile of Jobs, whose genius made Apple the powerhouse it is today Required reading for everyone who's ever listened to music on an iPod, Return to the Little Kingdom is timely and thorough, and the only book that explains how Steve Jobs founded the company that changed our world.

Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century


P.W. Singer - 2009
    More then seven thousand robotic systems are now in Iraq. Pilots in Nevada are remotely killing terrorists in Afghanistan. Scientists are debating just how smart - and how lethal - to make their current robotic prototypes. And many of the most renowned science fiction authors are secretly consulting for the Pentagon on the next generation.Blending historic evidence with interviews from the field, Singer vividly shows that as these technologies multiply, they will have profound effects on the front lines as well as on the politics back home. Moving humans off the battlefield makes wars easier to start, but more complex to fight. Replacing men with machines may save some lives, but will lower the morale and psychological barriers to killing. The "warrior ethos", which has long defined soldiers' identity, will erode, as will the laws of war that have governed military conflict for generations.While his analysis is unnerving, there's an irresistible gee-whiz quality to the innovations Singer uncovers. Wired for War travels from Iraq to see these robots in combat to the latter-day "skunk works" in America's suburbia, where tomorrow's technologies of war are quietly being designed. In Singer's hands, the future of war is as fascinating as it is frightening.

pfSense: The Definitive Guide


Michael W. Lucas - 2009
    A second book from the same publisher, pfSense Essentials (ISBN 978-1-937516-04-8), is based on version 2.4.4 with features from older and newer versions. The Definitive Guide to pfSense, written by pfSense co-founder Chris Buechler and pfSense consultant Jim Pingle, covers installation and basic configuration through advanced networking and firewalling with the popular open source firewall and router distribution. This book is designed to be a friendly step-by-step guide to common networking and security tasks, plus a thorough reference of pfSense's capabilities. The book covers hardware and system planning, installation and upgrades, backups, firewalling fundamentals, port forwarding and Network Address Translation, bridging, Virtual LANs (VLAN), Multi-WAN, Virtual Private Networks (VPN) using IPsec, PPTP, and OpenVPN, traffic shaping, load balancing, wireless networking and captive portal setups, redundant firewalls and High Availability, system monitoring, logging, traffic analysis, sniffing, packet capturing, troubleshooting, and software package and third-party software installations and upgrades.

CompTIA Network+ All-In-One Exam Guide [With CDROM]


Mike Meyers - 2009
    Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Network+ exam with ease, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to: Build a network with the OSI seven-layer model Configure network hardware, topologies, and cabling Connect multiple Ethernet components Configure wireless networksWork with network protocols, including TCP/IP, DNS, SIP, and IMAPConfigure IPv4 and IPv6 routing protocolsShare and access network resources Interconnect network operating systems-Windows, Mac OS, UNIX/Linux Set up clients and servers for remote accessMonitor and troubleshoot networksSecure networks with firewalls, packet filtering, encryption, authentication, and other methodsThe CD-ROM featuresHundreds of practice questionsVideo introduction to CompTIA Network+A collection of Mike's favorite shareware and freeware networking tools and utilitiesComplete electronic book

Comptia Security+: Get Certified Get Ahead: Sy0-201 Study Guide


Darril Gibson - 2009
    Learn from an expert in the field with over twenty years' experience in the IT arena. Over the years, author Darril Gibson has helped hundreds of students get certified, and has included in this text the time-tested information used in his successful classes. This manual covers one hundred percent of all exam objectives and includes real world examples of security principles in action. Also included are over 375 practice test questions with in-depth explanations. Written with clarity and efficiency, CompTIA Security+ SY0-201: Get Certified, Get Ahead is a one-stop shop for any IT professional interested in advancing in the IT field and a must read for anyone striving to master the basics of IT systems security.

Songs From the Other Side of The Wall


Dan Holloway - 2009
    Then a letter arrives that threatens everything, and forces her to choose once and for all: between the past and the present; between East and West; between her family and her lover.(Complete novel)

grep Pocket Reference


John Bambenek - 2009
    This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it -- for everything from mail filtering and system log management to malware analysis. With grep Pocket Reference, you will:Learn methods for filtering large files for specific content Acquire information not included in the current grep documentation Get several tricks for using variants such as egrep Keep key information about grep right at your fingertips Find the answers you need about grep quickly and easily. If you're familiar with this utility, grep Pocket Reference will help you refresh your basic knowledge, understand rare situations, and work more efficiently. If you're new to grep, this book is the best way to get started.

ToGAF 9 Foundation Study Guide: Preparation for the TOGAF 9 Part 1 Examination


Rachel Harrison - 2009
    It gives an overview of every learning objective for the TOGAF 9 Foundation Syllabus and in-depth coverage on preparing and taking the TOGAF 9 Part 1 Examination. It is specifically designed to help individuals prepare for certification.This Study Guide is excellent material for:a) Individuals who require a basic understanding of TOGAF 9b) Professionals who are working in roles associated with an architecture project such as those responsible for planning, execution, development, delivery, and operationc) Architects who are looking for a first introduction to TOGAF 9d) Architects who want to achieve Level 2 certification in a stepwise manner and have not previously qualified as TOGAF 8 CertifiedA prior knowledge of enterprise architecture is advantageous but not required. While reading this Study Guide, the reader should also refer to the TOGAF Version 9.1 documentation available online at www.opengroup.org and also available as hard copy from www.vanharen.net and online booksellers

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System


Bill Blunden - 2009
    Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0

CCNP SWITCH 642-813 Official Certification Guide (Official Cert Guide)


David Hucaby - 2009
    4594 CCNP SWITCH Exam Preparation Master the CCNP(R) SWITCH 642-813 exam with this official study guide Assess your knowledge with chapter-opening quizzes Review key concepts with Exam Preparation Tasks Practice with realistic exam questions on the CD-ROM "CCNP SWITCH 642-813 Official Certification Guide" is a best-of-breed Cisco(R) exam study guide that focuses specifically on the objectives for the CCNP(R) SWITCH exam. Network architect and best-selling author Dave Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. "CCNP SWITCH 642-813 Official Certification Guide" presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. The complete exam topic list makes referencing easy. Chapter-ending Exam Preparation Tasks sections help drill you on key concepts and commands you must know thoroughly. The companion CD-ROM contains a powerful testing engine that enables you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a topic-by-topic basis, laying out a complete study plan for review. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. "CCNP SWITCH 642-813 Official Certification Guide" is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This official study guide helps you master all the topics on the CCNP SWITCH exam, includingNetwork design, implementation, and verification plans Switch operation and port configuration VLANs, trunks, and VLAN Trunking Protocol (VTP) Aggregating switch links Spanning Tree Protocol (STP) Multilayer switching Enterprise campus network design Router and supervisor redundancy IP telephony Wireless LANs Switched network security "This volume is part of the Official Certification Guide Series from Cisco Press. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears." Category: Cisco Press--Cisco CertificationCovers: CCNP SWITCH exam 642-813

The Mac Hacker's Handbook


Charlie Miller - 2009
    This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses.

The Rough Guide To Girl Stuff


Kaz Cooke - 2009
    From friends, body changes, clothes school stress, exercise and sex to smoking, embarrassment, dieting, guys, drinking, drugs and heartbreak. Not to mention how to beat bullies and mean girls, earn money, find new friends and get on with your family. Written by award winning author Kaz Cooke, in extensive consultation with medical, psychological and practical experts; The Rough Guide to Girl Stuff provides a wealth of practical tips and non-judgemental advice for teens (and their parents!) Girl Stuff is split in to four key themes: Body, Head, Heart and On the Go and each chapter includes facts, hints, inspiring lists, hundreds of quotes from real girls, and details of websites and books for useful tips if you want to find out more. Designed to be a friend through the teenage years, The Rough Guide to Girl Stuff will be your best friend through every change and challenge.Girl Stuff is the book I wanted when I was a teenager; a 'best friend' that will honestly answer every question about everything" (Kaz Cooke)

The Duchesses: The Story of Britain's Ultimate Steam Locomotives


Andrew Roden - 2009
    They were the flagships of the West Coast main line for the London, Midland, and Scottish Railway and were made to compete with the famous streamlined “Pacific” class locomotives on the East Coast line. The Coronation locomotives were beautifully streamlined and considered the pride of the line for decades. This is the engaging story of the most powerful passenger locomotives to serve on the British Railways' network and the extraordinary saga of their preservation, eventual rescue, and their return to steam on the main line.

Windows PowerShell 2.0: Administrator's Pocket Consultant


William R. Stanek - 2009
    Zero in on core commands and techniques using quick-reference tables, instructions, and lists. You’ll get the focused information you need to save time and get the job done—whether at your desk or in the field. Get fast facts to:Run core cmdlets—singly or in sequence—to streamline daily tasksExecute remote commands and background jobsInventory computers; tweak configurations; manage domainsConfigure server roles, role services, and featuresManage and troubleshoot TCP/IP networkingAdminister file systems, directories, and print servicesImplement security settings, event logs, and auditingRead and write registry valuesAutomate system monitoring and performance tuningExtend Windows PowerShell with snap-ins and module extensions

Computer and Information Security Handbook


John R. Vacca - 2009
    Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

The Nature of Technology: What It Is and How It Evolves


W. Brian Arthur - 2009
    Brian Arthur puts forth the first complete theory of the origins and evolution of technology, in a major work that achieves for the invention of new technologies what Darwin’s theory achieved for the emergence of new species. Brian Arthur is a pioneer of complexity theory and the discoverer of the highly influential "theory of increasing returns," which took Silicon Valley by storm, famously explaining why some high-tech companies achieve breakaway success. Now, in this long-awaited and ground-breaking book, he solves the great outstanding puzzle of technology—where do transformative new technologies come from?—putting forth the first full theory of how new technologies emerge and offering a definitive answer to the mystery of why some cultures—Silicon Valley, Cambridge, England in the 1920s—are so extraordinarily inventive. He has discovered that rather than springing from insight moments of individual genius, new technologies arise in a process akin to evolution. Technology evolves by creating itself out of itself, much as a coral reef builds itself from activities of small organisms. Drawing on a wealth of examples, from the most ancient to cutting-edge inventions of today, Arthur takes readers on a delightful intellectual journey, bringing to life the wonders of this process of technological evolution. The Nature of Technology is the work of one of our greatest thinkers at the top of his game, composing a classic for our times that is sure to generate wide acclaim.

The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise


Martin L. Abbott - 2009
    Abbott and Michael T. Fisher cover everything IT and business leaders must know to build technology infrastructures that can scale smoothly to meet any business requirement. Drawing on their unparalleled experience managing some of the world s highest-transaction-volume Web sites, the authors provide detailed models and best-practice approaches available in no other book. Unlike previous books on scalability, "The Art of Scalability" doesn t limit its coverage to technology. Writing for both technical and nontechnical decision-makers, this book covers everything that impacts scalability, including architecture, processes, people, and organizations. Throughout, the authors address a broad spectrum of real-world challenges, from performance testing to IT governance. Using their tools and guidance, organizations can systematically overcome obstacles to scalability and achieve unprecedented levels of technical and business performance. Coverage includes Staffing the scalable organization: essential organizational, management, and leadership skills for technical leaders Building processes for scale: process lessons from hyper-growth companies, from technical issue resolution to crisis management Making better build versus buy decisions Architecting scalable solutions: powerful proprietary models for identifying scalability needs and choosing the best approaches to meet them Optimizing performance through caching, application and database splitting, and asynchronous design Scalability techniques for emerging technologies, including clouds and grids Planning for rapid data growth and new data centers Evolving monitoring strategies to tightly align with customer requirements "

Museums in a Digital Age


Ross Parry - 2009
    Today museums are reliant on new technology to manage their collections. They collect digital as well as material things. New media is embedded within their exhibition spaces. And their activity online is as important as their physical presence on site.However, 'digital heritage' (as an area of practice and as a subject of study) does not exist in one single place. Its evidence base is complex, diverse and distributed, and its content is available through multiple channels, on varied media, in myriad locations, and different genres of writing.It is this diaspora of material and practice that this Reader is intended to address. With over forty chapters (by some fifty authors and co-authors), from around the world, spanning over twenty years of museum practice and research, this volume acts as an aggregator drawing selectively from a notoriously distributed network of content. Divided into seven parts (on information, space, access, interpretation, objects, production and futures), the book presents a series of cross-sections through the body of digital heritage literature, each revealing how a different aspect of curatorship and museum provision has been informed, shaped or challenged by computing.Museums in a Digital Age is a provocative and inspiring guide for any student or practitioner of digital heritage.

Microsoft Windows 7 Unleashed


Paul McFedries - 2009
    With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details. Microsoft(R) Windows 7 Unleashed gives IT professionals, serious power users, and true geeks the powerhouse Windows 7 tweaks, hacks, techniques, and insights they need: knowledge that simply can't be found anywhere else. Top Windows expert Paul McFedries dives deep into Windows 7, returning with the most powerful ways to handle everything from networking to administration, security to scripting. McFedries begins with advanced customization, covering everything from startup/shutdown to the file system. He introduces new ways to tune Windows 7 performance, police Windows via Group Policies, tweak the Registry, make the most of Windows 7s management tools, and control Windows 7 from the command line. You'll find thorough coverage of securing Windows 7, including detailed guidance on web and email security and hardening both wireless and wired networks. You'll also discover better ways to troubleshoot devices, networks, and startup; add Macs to Windows networks; and automate Windows administration with state-of-the-art scripting techniques. This book is packed with expert tips, tricks, and troubleshooting techniques drawn from McFedries' unsurpassed Windows experience. If you want maximum value and performance from your Windows 7 PCs, you won't find a more valuable resource. Customize everything about Windows 7: IE8, startup/shutdown, file systems, the Start menu, Taskbar, and moreSystematically monitor, tune, and optimize Windows performance-including practical techniques for accelerating startupSet up an easy, automated 9-Step maintenance schedule for any Windows 7 PCUnleash Windows 7s power user tools, including Group Policies, the Registry, MMC, and the command lineSecure Windows 7 with security settings: auto-lock, Windows Firewall, Windows Defender, parental controls, BitLocker encryption, and moreProtect your web privacy with Windows 7s new InPrivate BrowsingSolve problems with Windows 7, startup, networking, and hardwareSet up reliable Windows 7 networks, and manage them efficientlySafely provide remote access and VPN connectivityUse Windows 7 as a Web serverProgram the Windows Scripting Host and Windows PowerShell ON THE WEB: Free Online Edition! When Microsoft releases the final product, you can get an updated edition of this book absolutely free!All examples and source code presented in this book $49.99 USA / $59.99 CANz

C Programming for Embedded Microcontrollers


Warwick A. Smith - 2009
    This book focuses on programming ARM microcontrollers from Atmel. It also helps you learn how to download, set up and use free C programming tools. It is suitable for electronic hobbyists, students and engineers.

Teaching the New Writing: Technology, Change, and Assessment in the 21st Century Classroom


Anne Herrington - 2009
    The book also addresses assessment: How can teachers navigate the reductive definitions of writing in current national and statewide testing? What are teachers' goals for their students' learning--and how have they changed in the past 20 years? What is "the new writing"? How do digital writers revise and publish? What are the implications for the future of writing instruction?The contributing authors are teachers from public, independent, rural, urban, and suburban schools. Whether writing instructors embrace digital literacy now or see the inevitable future ahead, this groundbreaking book (appropriate for the elementary through college level) will both instruct and inspire.

The New Encyclopedia of Gardening Techniques


American Horticultural Society - 2009
    The AHS New Encyclopedia of Gardening Techniques is the new definitive guide to explaining all the essential techniques you are ever likely to need. It reflects modern best-practice gardening at the American Horticultural Society, a leading gardening authority. All techniques are shown clearly and simply with step-by-step instructions for every gardener to follow. Contains more than 2000 clear and concise color illustrations supported by over 1000 beautiful color photos. Includes steps for planning, pruning, propagating, feeding and watering. Covers all plants including trees, flowers, shrubs, climbers, lawns, vegetables, fruit and herbs. Shows how to create water features and patios, and add lighting. Includes organic techniques, recycling and how to treat pests and diseases. There are also chapters on container gardening, gardening under glass, garden tools and equipment, and everyday garden maintenance as well as on landscaping and construction work. The wealth of practical information makes this book an essential purchase for both professional and amateur gardeners

Grol+Radar


Gordon West - 2009
    GROL+RADAR covers Element 1, Marine Radio Operator Permit (MROP); Element 3, General Radio Telephone Operator License (GROL); and Element 8, Ship RADAR Endorsement. The book is fully illustrated and contains the exact questions and answer choices from the official FCC question pools. Author Gordon West provides an educational answer explanation for each question, telling the reader which answer is correct and discussing why it is correct. The book also includes a searchable CD-ROM containing the entire FCC Telecommunications Rules for Parts 2, 13, 23, 73, 80 and 87. GROL+RADAR also is available with study software that allows the student to take practice examinations on their PC. A new feature of the software includes the answer explanations from the book. If the student answers the question wrong on the software, the correct answer appears along with the Gordon West explanation to reinforce learning. See ISBN 9780945053613 for the book and software package.

Escaping the Bonds of Earth: The Fifties and the Sixties


Ben Evans - 2009
    Each volume will focus not only upon the individual missions within 'its' decade, but also upon the key challenges facing human space exploration at specific points within those 50 years: from the simple problems of breathing and eating in space to the challenges of venturing outside in a pressurised spacesuit and locomotion on the Moon.The first volume of this series will focus upon the 1960s, exploring each mission from April 1961 to April 1971 in depth: from the pioneering Vostok flights to the establishment of the first Salyut space station and from Alan Shepard's modest sub-orbital 'hop' into space to his triumphant arrival at the Moon's Fra Mauro foothills almost a decade later.The Introduction sets the scene with early plans to explore space, balloon flights and such details as the development of pressure suits. Each of the Vostok missions is then covered in depth, together with unmanned precursor flights, subsequent plans and the development of Voskhod. Chapter 2 studies the Mercury missions together with unmanned and monkey flights, the development of the Redstone and Atlas boosters and the ill-fated Dyna-Soar, while the twin Voskhod missions, including the first three-man space crew, first spacewalk and plans for subsequent Voskhods to extend time in space are covered in the third chapter. Each of the Gemini missions arethen described, as well as why and how the United States managed to achieve such a 'lead' over the Soviet Union, practising techniques for lunar landings, the development of spacesuit technology for extravehicular activities, 'Blue Gemini' and the Manned Orbiting Laboratory. The Soyuz 1 and Apollo 1 tragedies and aftermath, including redesign, changes to future plans and the effect of Korolev's death precede a chapter on the United States' drive for the Moon, up to Apollo 14, including the challenges facing the first lunar explorers, the consistency of lunar soil and the development of spacesuits to handle locomotion. This first volume ends with an analysis of Soviet direction changes from lunar exploration to long-term space stations (Soyuz 3 to 10 and the development of Salyut 1) and the progress of the human space program in the 1960s and plans for space exploration in the next decade.Each of the next four volumes will follow at yearly intervals, the final one coinciding with the 50th anniversary of Gagarin's epic journey:

Expressive Processing: Digital Fictions, Computer Games, and Software Studies


Noah Wardrip-Fruin - 2009
    Digital media, he contends, offer particularly intelligible examples of things we need to understand about software in general; if we understand, for instance, the capabilities and histories of artificial intelligence techniques in the context of a computer game, we can use that understanding to judge the use of similar techniques in such higher-stakes social contexts as surveillance.

The Corporeal Turn: An Interdisciplinary Reader


Maxine Sheets-Johnstone - 2009
    The corporeal turn is envisioned as an ever-expanding, continuous, and open-ended spiral of inquiry in which deeper and deeper understandings are forged, understandings that in each instance themselves call out for deeper and deeper inquiries. The first thirteen essays have already been published as distinct articles. The two new essays constituting the final two chapters are testimony to this open-ended spiral of inquiry.

Postphenomenology and Technoscience: The Peking University Lectures


Don Ihde - 2009
    Timely and insightful, this book provides a useful introduction to postphenomenology, asking how it can effectively transform classical phenomenology into a new and concrete reflection upon technoscience. Tracing the modern history of phenomenology, pragmatism, and philosophy of science, Don Ihde proposes a reframing of phenomenology to better suit today's contemporary world. An excellent overview of the recent history of the philosophy of science, Postphenomenology and Technoscience revitalizes conceptual frameworks that still have much to offer.

Cisco ASA: All-In-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance


Jazib Frahim - 2009
    Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features.Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASAIncludes detailed configuration examples, with screenshots and command line referencesCovers the ASA 8.2 releasePresents complete troubleshooting methodologies and architectural references "

The Definitive Guide to CentOS


Peter Membrey - 2009
    When belts have to be tightened, we want to read about an OS with all the features of a commercial Linux variety, but without the pain. The Definitive Guide to CentOS is the first definitive reference for CentOS and focuses on CentOS alone, the workhorse Linux distribution, that does the heavy lifting in small and medium-size enterprises without drawing too much attention to itself.Provides tutorial and hands-on learning but is also designed to be used as a reference Bases all examples on real-world tasks that readers are likely to perform Serves up hard-won examples and hints and tips from the author's experiences of CentOS in production

Magnum! The Wild Weasels in Desert Storm. The Elimination of Iraq's Air Defence


Braxton R. Eisel - 2009
    Building upon that record and the recollections of other F-4G Wild Weasel aircrew, the authors show a slice of what life and war was like during that time. The pawns in the game, the ones that had to actually do the fighting and dying were the hundreds of thousands of men and women who left their homes and families to live for seemingly endless months in the vast, trackless desert while the world stage-play unfolded. To them, the war was deeply personal. At times, the war was scary; at other times, it was funny as hell. Usually, if you survive the former, it turns into the latter.

Apollo Expeditions to the Moon: An Official NASA History of the Moon Landings


Neil Armstrong - 2009
    The history of the Apollo project, from Kennedy's decision to go to the moon, to the development of the Saturn V rocket and the Apollo spacecraft, to the fire which killed three astronauts, to the "one small step" by Neil Armstrong, and the final landing in 1972. This Kindle version is text-only, and does not contain the photos or illustrations.

Starting an Online Business All-In-One for Dummies


Shannon Belew - 2009
    Covering everything from creating a business plan and building a customer-friendly site to marketing with Facebook and Twitter, this fun and friendly guide features eleven minibooks that cover online business basics, legal and accounting matters, website design, online and operating issues, Internet security, techniques for boosting sales, storefront selling, fundraising sites, niche e-commerce, and more.Updated to include coverage of the latest online marketing tools, techniques, and trends Includes coverage of how to use social media sites like Facebook, Twitter, Foursquare, and Yelp to reach your customers as well as expanded coverage of mobile marketing Explains how your location can actually bring new customers to you Details ways to build a business plan that translates your ideas into a profitable enterprise Shares advice for choosing software to help you manage taxes, balance sheets, and other accounting chores; using PR and advertising tools that best promote your business online, including Google AdWords; and create a website that helps your business make money Discover why "online entrepreneurship" means more than just building a website. Starting an Online Business All-in-One For Dummies breaks down everything the budding entrepreneur needs to know to be successful online and keep your customers coming back for more.

The Biology of Coral Reefs


Charles R.C. Sheppard - 2009
    However, the combined effects of human activity have led to a rapid decline in the health of reefs worldwide, with many now facing complete destruction.This timely book provides an integrated overview of the function, physiology, ecology, and behaviour of coral reef organisms. Each chapter is enriched with a selection of 'boxes' on specific aspects written by internationally recognised experts. As with other books in the Biology of Habitats Series, the emphasis in this book is on the organisms that dominate this marine environment although pollution, conservation, climate change, and experimental aspects are also included. Indeed, particular emphasis is placed on conservation and management due to the habitat's critically endangered status. A global range of examples is employed which gives the book international relevance.This accessible text is intended for students, naturalists and professionals and assumes no previous knowledge of coral reef biology. It is particularly suitable for both senior undergraduate and graduate students (in departments of biology, geography, and environmental science) taking courses in coral reef ecology, marine biology, oceanography and conservation biology, as well as the many professional ecologists and conservation biologists requiring a concise overview of the topic. It is also of relevance and use to reef managers, recreational divers, and amateur naturalists.

Next Generation Excel: Modeling in Excel for Analysts and MBAs


Isaac Gottlieb - 2009
    Companies of all sizes use financial models to analyze their finances and plan business operations, as well as to create financial accounting reports like balance sheets, income statements, and statements of cash flows.While many businesspeople are quite familiar with the reports created with financial models, most are not as familiar with the creation of the models themselves. This book shows them how to build an accurate and effective financial model using the solid functionality and easy usability of Excel.Fully updated and revised to include support for Apple usersWritten by a professor of management and statistics who has taught the discipline for fifteen yearsAppropriate for professional financial analysts, as well as MBA studentsFor professionals and students whose responsibilities or studies include a full understanding of financial modeling, "Next Generation Excel, Second Edition" offers comprehensive training.

Sergey's HTML5 & CSS3 Quick Reference: Color Edition


Eddie Sergey - 2009
    HTML5 is on track to become the future of the web, offering simple plug-in free Rich Internet Application capabilities, easier development, and enhanced user experience. This book is an essential technical dictionary for professional web designers and developers, conveniently summarizing over 3000 pages of (X)HTML5 and CSS3 specifications and covering the most common and fundamental concepts and specs, including tags, attributes, values, objects, properties, methods, events, and APIs. Topics include: - Introduction to HTML5 - HTML5 and XTML5 syntax rules - Document semantic structure - Complete summary of HTML5 Elements and Attributes including Web Forms 2.0 - Global attributes and events - Complete summary of CSS3 properties - HTML5 APIs, including Canvas, SVG, Video, Audio, Web Workers, Web Sockets, Microdata, Geolocation, Web Storage and more.The author's goal was to create a one-stop resource reference source which is comprehensive but still concise, simple, easy-to-read, and structured. This is the world's first HTML5 reference-style book. This is also the first book with XHTML5 coverage.About the AuthorSergey Mavrody has been working with web technologies since the mid-nineties, focusing on UI design and development, creative direction, information architecture, interactive media, and enterprise applications with rich data visualization and advanced UI components. Sergey holds two Master's degrees. He is also a visual artist, chess master and educator with many years experience teaching as professor at the School of the Art Institute of Chicago.Publisher: Belisso Corp Pulishing date: December 30, 2010

Apple Training Series: iLife (iLife '09 Edition)


Michael E. Cohen - 2009
    This guide is completely updated to cover all the new features in iLife '09.

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century


Ryan Trost - 2009
    However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today's new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers' "geographical fingerprints" and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team

T-SQL 2008 Joes 2 Pros


Rick A. Morelan - 2009
    This book is out of print by the end of the year (2010) and has been replaced by "Beginning SQL Joes 2 Pros". http://www.amazon.com/Beginning-SQL-J...

Jesus Matters: Good News for the Twenty-First Century


James Krabill - 2009
    Topics include Jesus and creation, Jesus and the cross, Jesus and salvation, Jesus and mission, and Jesus and the future. Authors include Stanley Green, Michele Hershberger, Mark Thiessen Nation, Willard Swartley, Jack Suderman and April Yamasaki. Foreword by Shane Claiborne.Free downloadable study guide available here.

Tom Sachs: Space Program


Tom Sachs - 2009
    This publication documents the culmination of his research: the realization of his own life-size Space Program, comprised of three main sculptural elements (Lunar Module, Mission Control, and Space Suit) and a Flight Plan, all put to use during a live demonstration of a lunar landing. In his exuberant manufacture of objects and scenarios, Sachs asks barbed questions of modern creativity that relate to conception, production, consumption, and circulation. Space Program features 797 full-color and 30 black-and-white images; a conversation among Buzz Aldrin, Tom Sachs, and Louise Neri; a critical essay by Arthur C. Danto, contextualizing this work among the artist’s contemporaries; and a comprehensive discussion of the work by Mark Van de Walle. These are accompanied by appendices that provide a full visual and descriptive account of the innumerable components that make up Sachs’s work and illustrate the artist’s related drawings and source materials.

Technology And Values: Essential Readings


Craig Hanks - 2009
    It offers an in-depth range of readings on important applied issues in technology as well. Useful in addressing questions on philosophy, sociology, and theory of technology Includes wide-ranging coverage on metaphysics, ethics, and politics, as well as issues relating to gender, biotechnology, everyday artifacts, and architecture A good supplemental text for courses on moral or political problems in which contemporary technology is a unit of focus An accessible and thought-provoking book for beginning and advanced undergraduates; yet also a helpful resource for graduate students and academics

Microsoft Windows 7 in Depth


Robert Cowart - 2009
    Top Windows authors Robert Cowart and Brian Knittel have packed this 1,100-page book with intensely useful and practical information that can't be found elsewhere. You can turn here for expert guidance on... " Migrating to Windows 7 as an individual - or rolling it out throughout a business " Making the most of Windows 7's powerhouse media tools " Installing, configuring, and managing Windows 7 networks more quickly and efficiently " Securing Windows 7 PCs against spam, spyware, viruses and other "Net Nasties" " Using the updated Windows 7 interface more efficiently " Troubleshooting and solving Windows 7 problems more rapidly " And much more..

Mind Making


Patrick Roberts - 2009
    not on philosophy, science or reality, but why and how minds might invent such things. The laws of mind, not the laws of gravity or electricity, but the methods of the mind that made these tools. It is not on brains of neurons, controllers or computers, but the logical possibilities of mind, from minimal axioms deducing all the kinds of mind that are and can ever be."Mind Making applies original artificial intelligence research to precisely define "mind". On that foundation, author Patrick Roberts advances ancient questions of free-will, reality and ethics. Deeper, the book offers a scientific method for resolving philosophical questions."How to prove a model of mind? Only by testing an analogous combination of entirely mindless parts. Otherwise, you remain trapped in endless debates, never reaching certainties because you can't suspend your own mind. Twenty-five hundred years of futile verbal philosophical debate ends. Philosophy becomes an engineering problem: Machine mind m outperformed mind n in a statistically significant set of tests. n's assumptions about reality are wrong. m's are right and are complete because m contains no minds but those we made."To the psychologist, Mind Making offers a model of the human mind unburdened by the technicalities of neurons and chemistry. To the engineer, designs for more reliable, powerful machines. To the philosopher, proven ultimate reality. To the lay reader, better knowledge of his mind, and of his world as an effect of that mind."These laws of mind are all that can be true for everyone, everywhere, forever. They can't be false because they made truth. Always true, you need never doubt them. In your mind, they are the last possessions you can lose. By comparison, all other knowledge is trivia."

Get Found Now! Local Search Secrets Exposed: Learn How to Achieve High Rankings in Google, Yahoo and Bing


Richard Geasey - 2009
    Google, Yahoo and Bing all allow a business to list their unique information. Business owners who know how to complete and optimize these local business listings will see their search engine positions improve dramatically. Using Local Search Secrets Exposed you will be able to; claim your local business listing, create a local business listing optimized for "findability," use reviews to help maintain and boost your ranking in the search engines, include photos and videos in your listing and incorporate your brand identity improve visibility. Today's marketplace is so crowded you have to stand out from the pack. A successful business today requires a real web presence. If your customers can't find you on the web, how can they be expected to find you on the street? You CAN be the leader of the pack following the simple steps in this book.

Toyota 4Runner 2003 thru 2009 Haynes Repair Manual


John Harold Haynes - 2009
    Each Haynes manual is written for the do-it-yourselfer and provides step-by-step instructions based on a complete disassembly of the vehicle.  This hands-on experience provides the reader with specific and detailed instructions for performing everything from basic maintenance and troubleshooting to a complete engine overhaul.  The models and model years covered in this title are as follows: Toyota 4Runner (2003-2009)  This Haynes automotive repair manual includes 700+ photos and the following chapters:  Introduction Chapter 1: Tune-up and routine maintenance Chapter 2: Part A: V6 engines Chapter 2: Part B: V8 engines Chapter 2: Part C: General engine overhaul procedures Chapter 3: Cooling, heating and air conditioning systems Chapter 4: Fuel and exhaust systems Chapter 5: Engine electrical systems Chapter 6: Emissions and engine control systems Chapter 7: Part A: Automatic transmission Chapter 7: Part B: Transfer Case Chapter 8: Driveline Chapter 9: Brakes Chapter 10: Suspension and steering systems Chapter 11: Body Chapter 12: Chassis electrical system Wiring Diagrams

GIMP Bible


Jason van Gumster - 2009
    GIMP Bible is the most comprehensive and current independent GIMP reference available that goes beyond official documentation.If you're a digital artist or photographer, the step-by-step explanations in this authoritative guide show you how to power-use GIMP throughout a production pipeline. Topics include understanding the GIMP interface and how to work with it, how to use all of GIMP's tools to create high-quality images, GIMP's default filters and plug-ins, advanced techniques for customization with Python and Scheme scripting, and much more.GIMP (GNU Image Manipulation Program) is a free graphics editor that runs on Linux, Windows, or Macs; it is used to process digital graphics and photographs including creating graphics and logos, resizing and cropping photos, altering colors, combining images, creating basic GIF animated images, and more Whether you're a digital artist, professional photographer, or beginner, this detailed how-to shows you best practices, valuable techniques, and helpful tips for getting the most out of GIMP for your projects Topics include the GIMP interface and how to work with it, in-depth description of GIMP's tools and how to use them to create high-quality images, a comprehensive reference for all of GIMP's default filters and common plug-ins, and advanced customization with Python and Scheme scripting Get the most out of this free image editing tool for your production pipeline with the GIMP Bible.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Microsoft® Exchange Server 2010 Administrator�s Pocket Consultant


William R. Stanek - 2009
    Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the focused information you need to solve problems and get the job done—whether you’re at your desk or in the field!Get fast facts to:Configure and manage Exchange clientsSet up users, contacts, distribution lists, and address booksAdminister permissions, rules, policies, and security settingsManage databases and storage groupsOptimize message processing, logging, and anti-spam filteringAdminister at the command line using Exchange Management ShellConfigure SMTP, connectors, links, and Edge subscriptionsManage mobile device features and client accessBack up and restore systems

Windows 7 Secrets


Paul Thurrott - 2009
    Regardless of your level of knowledge, you'll discover little-known facts on how things work, what's new and different, and how you can modify Windows 7 to meet your own specific needs.A witty, conversational tone tells you what you need to know to go from Windows user to Windows expert and doesn't waste time with basic computer topics while point-by-point comparisons demonstrate the difference between Windows 7 features and functionality to those in Windows XP and Vista.Windows 7 is the exciting update to Microsoft's operating system Authors are internationally known Windows experts and Microsoft insiders Exposes tips, tricks, and secrets on the new features and functionality of Windows 7 Reveals best practices for customizing the system to work for you Investigates the differences between Windows 7 and previous versions of Windows No need to whisper! Window 7 Secrets is the ultimate insider's guide to Microsoft's most exciting Windows version in years.

Google SketchUp: The Missing Manual: The Missing Manual


Chris Grover - 2009
    Filled with step-by-step tutorials, this entertaining, reader-friendly guide will have you creating detailed 3-D objects, including building plans, furniture, landscaping plans -- even characters for computer games -- in no time.Google SketchUp: The Missing Manual offers a hands-on tour of the program, with crystal-clear instructions for using every feature and lots of real-world examples to help you pick up the practical skills you need. Learn to use the basic tools, build and animate models, and place your objects in Google Earth. With this book, you will:Learn your way around the SketchUp workspace, and explore the differences between working in 2-D and 3-D Build simple 3-D shapes, save them as reusable components, and use SketchUp's Outliner to show or hide them as you work Tackle a complicated model building with lots of detail, and discover timesaving tools for using many components Animate the model by creating an interior walkthrough of your building Dress up your model with realistic material shading and shadows, and place it in Google Earth It's easy to get started. Just download the program from Google.com, and follow the instructions in this book. You'll become a SketchUp master in a jiffy.

Foa Reference Guide to Fiber Optics: Study Guide to Foa Certification


Jim Hayes - 2009
    It was written with the assistance of many experienced Fiber Optic Association (FOA) instructors in fiber optics as a reference book for classes aimed at FOA CFOT certification as well as a basic reference for anyone working in the field of fiber optics. This book offers expansive coverage on the components and processes of fiber optics as used in all applications and installation practices. A complete curriculum for teaching fiber optics using this book as a text is available from FOA.

The Socially Networked Classroom: Teaching In The New Media Age


William R. Kist - 2009
    William Kist demonstrates how pioneering teachers have successfully integrated screen-based literacies into instruction and provides:Real-world activities and lesson examples for Grades 5-12, with assignment sheets, assessments, and rubrics Ideas on fostering collaborative learning using blogs, wikis, nings, and other interactive media. Tips on Internet safety, blogging etiquette, protected blogging sites, and more Blog entries from classroom teachers

Wiring Up the Big Brother Machine...and Fighting It


Mark Klein - 2009
    After the New York Times revealed in 2005 that the NSA was spying on Americans' phone calls and e-mail without Constitutionally-required court warrants, the Bush administration openly defended this practice which also violated the Foreign Intelligence Surveillance Act. All details of the highly secret program remained hidden from the public-until Klein came forward. A technician for over 22 years at telecom giant AT&T, Klein was working in the Internet room in San Francisco in 2003 and discovered the NSA was vacuuming everyone's communications into a secret room, and he had the documents to prove it (sample pages included). He went to the media in 2006, and then became a witness in a lawsuit brought against the company by the Electronic Frontier Foundation.

The Futurist: The Life and Films of James Cameron


Rebecca Keegan - 2009
    It’s a distinction he’s long been building, through a directing career that includes such cinematic landmarks as The Terminator, Aliens, The Abyss, and the highest grossing movie of all time, Titanic. The Futurist is the first in-depth look at every aspect of this audacious creative genius—culminating in an exclusive behind-the-scenes glimpse of the making of Avatar, the movie that promises to utterly transform the way motion pictures are created and perceived. As decisive a break with the past as the transition from silents to talkies, Avatar pushes 3-D, live action, and photo-realistic CGI to a new level. It rips through the emotional barrier of the screen to transport the audience to a fabulous new virtual world.            With cooperation from the often reclusive Cameron, author Rebecca Keegan has crafted a singularly revealing portrait of the director’s life and work. We meet the young truck driver who sees Star Wars and sets out to learn how to make even better movies himself—starting by taking apart the first 35mm camera he rented to see how it works. We observe the neophyte director deciding over lunch with Arnold Schwarzenegger that the ex-body builder turned actor is wrong in every way for the Terminator role as written, but perfect regardless. After the success of The Terminator, Cameron refines his special-effects wizardry with a big-time Hollywood budget in the creation of the relentlessly exciting Aliens. He builds an immense underwater set for The Abyss in the massive containment vessel of an abandoned nuclear power plant—where he pushes his scuba-breathing cast to and sometimes past their physical and emotional breaking points (including a white rat that Cameron saved from drowning by performing CPR). And on the set of Titanic, the director struggles to stay in charge when someone maliciously spikes craft services’ mussel chowder with a massive dose of PCP, rendering most of the cast and crew temporarily psychotic.            Now, after his movies have earned over $5 billion at the box office, James Cameron is astounding the world with the most expensive, innovative, and ambitious movie of his career. For decades the moviemaker has been ready to tell the Avatar story but was forced to hold off his ambitions until technology caught up with his vision. Going beyond the technical ingenuity and narrative power that Cameron has long demonstrated, Avatar shatters old cinematic paradigms and ushers in a new era of storytelling.                                                                                                  The Futurist is the story of the man who finally brought movies into the twenty-first century.

Trains (Snapshot Picture Library)


Weldon Owen - 2009
    Accompanied by a read-along audio track, more than 70 colorful photos showcase all kinds of trains. Whether they’re speeding across countries, zooming through subway tunnels, or hauling heavy cargo, trains work hard. Learn fascinating facts about early steam engines, city trolleys, modern bullet trains, and more.Snapshot Picture Library books include a read-along feature: Children can read along with an audio track, following the highlighted words on each page. Perfect for pre-readers and early readers!Kids will enjoy learning fun facts about trains, and the more than 70 beautiful color photographs will delight anyone who loves trains, especially toddlers, preschoolers, and elementary-school children.64 pages70 color photos

Statistical Analysis of Network Data: Methods and Models


Eric D. Kolaczyk - 2009
    The combination of an increasingly pervasive interest in scienti c analysis at a systems level and the ever-growing capabilities for hi- throughput data collection in various elds has fueled this trend. Researchers from biology and bioinformatics to physics, from computer science to the information sciences, and from economics to sociology are more and more engaged in the c- lection and statistical analysis of data from a network-centric perspective. Accordingly, the contributions to statistical methods and modeling in this area have come from a similarly broad spectrum of areas, often independently of each other. Many books already have been written addressing network data and network problems in speci c individual disciplines. However, there is at present no single book that provides a modern treatment of a core body of knowledge for statistical analysis of network data that cuts across the various disciplines and is organized rather according to a statistical taxonomy of tasks and techniques. This book seeks to ll that gap and, as such, it aims to contribute to a growing trend in recent years to facilitate the exchange of knowledge across the pre-existing boundaries between those disciplines that play a role in what is coming to be called 'network science.

Disrupted Cities: When Infrastructure Fails


Stephen Graham - 2009
    But the book also excavates the politics of more hidden disruptions: the clogging of city sewers with fat; the day-to-day infrastructural collapses which dominate urban life in much of the global south; the deliberate devastation of urban infrastructure by state militaries; and the ways in which alleged threats of infrastructural disruption have been used to radically reorganize cities as part of the 'war on terror'.Accessible, topical and state-of-the art, Disrupted Cities will be required reading for anyone interested in the intersections of technology, security and urban life as we plunge headlong into this quintessentially urban century. The book's blend of cutting-edge theory with visceral events means that it will be particularly useful for illuminating urban courses within geography, sociology, planning, anthropology, political science, public policy, architecture and technology studies.

Escape The Wolf: A Security Handbook for Traveling Professionals


Clinton Emerson - 2009
    "With Mark VanBeest and Lynn Walters"--Cover.

Fast Track to Sailing: Learn to Sail in Three Days


Steve Colgate - 2009
    Now theyare making their proven instructional methods availableto you so you can fulfill your sailing dreams in little time.Though designed around three days of intensiveinstruction, the book adapts easily to any learning pace.You can master the fundamentals inthree days--or over a summer of leisurely sailing.

Professional Microsoft SQL Server 2008 Programming


Robert Vieira - 2009
    However, it does maintain roots going back a few versions and looks out for backward compatibility issues with SQL Server 2005 and SQL Server 2000. These versions are old enough that there is little to no time spent on them except in passing.The book is oriented around developing on SQL server. Most of the concepts are agnostic to what client language you use although the examples that leverage a client language general do so in C#. For those who are migrating from early versions of SQL Server, some "gotchas" that exist any time a product has versions are discussed to the extent that they seem to be a genuinely relevant issue.This book assumes that you have some experience with SQL Server and are at an intermediate to advanced level. The orientation of the book is highly developer focused. While there is a quick reference-oriented appendix, there is very little coverage given to beginner level topics. It is assumed that you already have experience with data manipulation language (DML) statements and know the basics of the mainstream SQL Server objects (views, stored procedures, user defined functions, etc.). If you would like to brush up on your knowledge before diving into this book, the author recommends reading Beginning SQL Server 2008 Programming first. There is very little overlap between the Beginning and Professional books and they are designed to work as a pair.

Apple Training Series: Mac OS X Deployment v10.6: A Guide to Deploying and Maintaining Mac OS X and Mac OS X Software: A Guide to Deploying and ... X v10.6 - Snow Leopard Sxstems and Software


Kevin M. White - 2009
    Whether you're a support technician or simply an ardent Mac user, you'll quickly learn and master the new features in... Full description

Glimpses of Creatures in Their Physical Worlds


Steven Vogel - 2009
    These characteristics impose limits but also create remarkable and subtle opportunities for the functional biology of organisms. In particular, Steven Vogel examines the size and scale, and trade-offs among different physical processes. He pays attention to how the forms and activities of animals and plants reflect the materials available to nature, and he explores the unique constraints and possibilities provided by fluid flow, structural design, and environmental forces.Each chapter of the book investigates a facet of the physical world, including the drag on small projectiles; the importance of diffusion and convection; the size-dependence of acceleration; the storage, conduction, and dissipation of heat; the relationship among pressure, flow, and choice in biological pumps; and how elongate structures tune their relative twistiness and bendiness. Vogel considers design-determining factors all too commonly ignored, and builds a bridge between the world described by physics books and the reality experienced by all creatures. Glimpses of Creatures in Their Physical Worlds contains a wealth of accessible information related to functional biology, and requires little more than a basic background in secondary-school science and mathematics.Drawing examples from creatures of land, air, and water, the book demonstrates the many uses of biological diversity and how physical forces impact biological organisms.

The Engines of Pratt & Whitney:A Technical History As Told by the Engineers Who Made the History (Library of Flight)


Jack Connors - 2009
    Included are hundreds of archival photographs, as well as over a dozen tables listing specifications and applications. The story starts with the founding of the company in the 1920s to provide reliable air-cooled piston engines to the military and to help create coast-to-coast commercial flight service. Pratt & Whitney quickly dominated commercial and military flight in the 1930s, ultimately providing half the horsepower of American engines during World War II. Jack Connors explains how Pratt & Whitney came from behind the competition in developing gas turbines after the war with the debut of the J57, which powered the B-52 in 1952 and later the Air Force Century Series fighters (F-100, F-101, and F-102) and the Navy A-3D, F-4D, and F-8 airplanes. Also covered is the development of the J58, which powered the Mach 3+ YF-12 and SR-71 aircraft and subsequent military engines; the F100 in the F-15 and F-16; the F119 in the F-22; and, the F135 in the F-35 series. Pratt & Whitney's contribution to the luxury commercial jet era travel is also detailed, with its JT3, JT3D, JT4, JT8D, JT9D, PW2000, PW4000, and PW6000 in Boeing, Douglas, and Airbus aircraft. This history of Pratt & Whitney's role in the evolution of aircraft engines from 1925 to the present day offers young engineers a wealth of insights about design, development, marketing, and product support for commercial and military customers.

The Biology of Caves and Other Subterranean Habitats (Biology of Habitats)


David C. Culver - 2009
    The question of how such organisms have evolved, and the relative roles of natural selection and genetic drift, has engaged subterranean biologists for decades. Indeed, these studies continue to inform the more general question of adaptation and evolution. However, interest in subterranean biology is not limited to questions of evolutionary biology. Both the distribution and the apparent ancient age of many subterranean species continue to be of significant interest to biogeographers. Subterranean ecosystems generally exhibit little or no primary productivity and, as "extreme" ecosystems, provide general insights into ecosystem function. Furthermore, the simplicity of subterranean communities relative to most surface-dwelling communities makes them useful model systems for the study of species interactions such as competition and predation, as well as more general principles of ecosystem function. The rarity of many cave species makes them of special interest in conservation biology. The Biology of Caves and other Subterranean Habitats offers a concise but comprehensive introduction to cave ecology. While there is an emphasis on the organisms that dominate this unique environment, conservation and management aspects are also considered. The book includes a global range of examples and case studies from both caves and non-cave subterranean habitats; it also provides a clear explanation of specialized terms used by speleologists. This accessible text will appeal to researchers new to the field and to the many professional ecologists and conservation practitioners requiring a concise but authoritative overview. Its engaging style will also make it suitable for senior undergraduate and graduate students taking courses in cave and subterranean biology. Each of the books in the Oxford Biology of Habitats Series introduces a different habitat, and gives an integrated overview of the design, physiology, ecology, and behaviour of the organisms found there. The practical aspects of working within each habitat, the sorts of studies that are possible, and habitat biodiversity and conservation status are all explored.

Space Travel and Culture Space Travel and Culture: From Apollo to Space Tourism from Apollo to Space Tourism


David J. Bell - 2009
    Explores the significance of the first Apollo moon landing and how the countless books, films, and products associated with factual space fiction had an affect on popular culture and artistic practice, but not social sciences and humanities Investigates how a topic is hugely important in popular culture, but almost invisible in the academy, and how it makes us want to ask questions about visibility, or perhaps self-censorshipEvaluates how little impact the space age actually had on the social sciences and humanities - partly because its combination of military-industrial cold war politics, combined with patriarchy and big science, sits uneasily with contemporary thought in these areasProvides an interdisciplinary collection of essays on various aspects of NASA, the moon landing, and the commercialization of space generallyThe book travels from hard engineering to space romance, echoing the variety of attempts to blur science and culture

Accelerated Silverlight 3


Ashish Ghoda - 2009
    The book assumes you're already comfortable with the basics of .NET coding and with WPF and builds on your existing knowledge to make your journey to Silverlight 3 proficiency as quick and painless as possible. Where coding techniques are similar to other, more established, areas of .NET, the text says so. Likewise, where there's a syntax or conceptual "gotcha" that you're existing coding habits will walk you into, the text points that out, too.This book provides you with fast-track coverage of all the most important elements of the Silverlight 3 technology ranging from XAML to standard controls, from dealing with media to networking, from testing to deployment. It concludes with a pair of fully worked sample applications for you to follow through, because nothing reinforces your understanding of how concepts fit together as much as looking at finished code.It is assumed that readers are already be comfortable with the workings of the .NET framework. Knowledge of Expression Blend is useful, but not mandatory: you'll learn the Blend techniques that you need to know as you go through the book. By the end, you will have followed a sound, concise, path to mastery of Silverlight 3.

Safe Practices for Life Online: A Guide for Middle and High School


Doug Fodeman - 2009
    Containing dozens of classroom-tested exercises and hundreds of links to Web sites, documents, and resources, Safe Practices for Life Online offers practical advice to help middle and high school students stay safe by making better choices and minimizing their risks.

Death Investigation in America: Coroners, Medical Examiners, and the Pursuit of Medical Certainty


Jeffrey M. Jentzen - 2009
    Why is the American system of death investigation so inconsistent and inadequate? What can the events of the assassination of President Kennedy, killing of Bobby Kennedy, and Chappaquiddick reveal about the state of death investigation?If communities in early America had a coroner at all, he was politically appointed and poorly trained. As medicine became more sophisticated and the medical profession more confident, physicians struggled to establish a professionalized, physician-led system of death investigation. The conflict between them and the coroners, as well as politicians and law enforcement agencies, led to the patchwork of local laws and practices that persist to this day.In this unique political and cultural history, Jentzen draws on archives, interviews, and his own career as a medical examiner to look at the way that a long-standing professional and political rivalry controls public medical knowledge and public health.

Surviving An Sap Audit


Steve Biskie - 2009
    You'll get an overview of how auditors approach an SAP audit, learn about the specific SAP applications and components and their related business processes, and explore the audit issues related to the initial implementation or upgrade of an SAP system. With the practical, proven advice you'll find throughout this book, you'll learn how to "think like an auditor," and discover how to prepare your specific domains for an SAP system audit. Topic Highlights- Audit concerns for financial reporting- Implementation/upgrade controls- Application-level audit roadmaps- Basis settings and security- Change control and transports- Audit tips and tools- Best practices and lessons learned

Friction is Fiction: The Future of Content, Media & Business


Gerd Leonhard - 2009
    'Friction is Fiction' presents a constantly updated compilation of Gerd's best essays, writings and most popular blog posts. The central meme is that the Internet has completely disrupted the traditional notion of generating higher income by simply taking advantage of possible friction points and hurdles within transactions or business processes, i.e. by controlling the 'people formerly known as consumers'. The Future is all about winning the trust, and turning attention into revenues.PS: because of the cost of on-demand production, this 4-color version is unfortunately rather expensive (but nice); please look for the $20 B&W version here on Lulu if you want to save some $. Plus: if you just can't swing the few $ for the PDF, here, just ping me via www.twitter.com/gleonhard and I will send you the link to a free, lower-resolution PDF version

Django 1.0 Website Development


Ayman Hourieh - 2009
    This book is for web developers who want to learn to build a complete site with Web 2.0 features, using the power of a proven and popular development system, Django, but do not necessarily want to learn how the complete framework functions in order to do this. Basic knowledge of Python development is required for this book, but no knowledge of Django is expected.

One Nation, Under Surveillance -- Privacy From the Watchful Eye


Boston T. Party - 2009
    “paranoia”private travel in the 21st Centurymodern communications and privacythe coming National I.D. Cardprivate money -- debit cards, digital goldcan your home still be your castle?guns & privacysecuring your computerghosting the Internetuse encrypted VoIP for freecreate robust passphrasesWindows: a surveillance virus masquerading as an OS?get a new Puppy . . . Linux!dealing with the intrusive Census and ACS questionsearning a discreet livinghow to buy and sell privatelyanswering the old “If you’ve got nothing to hide, then . . . ”

New Media Art


Reena Jana - 2009
    By presenting objects as simple objects, minimal artists sought to communicate without referring to expressive or historical themes. This critical movement, which began in the 1960s and branched out into land art, performance art, and conceptual art, is still a major influence today.Featured artists: Carl Andre, Stephen Antonakos, Jo Baer, Larry Bell, Ronald Bladen, Walter De Maria, Dan Flavin, Robert Grosvenor, Eva Hesse, Donald Judd, Gary Kuehn, Sol LeWitt, Robert Mangold, John McCracken, Robert Morris, Robert Ryman, Fred Sandback, Richard Serra, Tony Smith, Frank Stella, Robert Smithson, Anne Truitt

Apple Training Series: iWork 09


Richard Harrington - 2009
    Focused lessons take you step by step through all aspects of Keynote, Pages, and Numbers. The self-paced book/DVD combo uses real-life material and practical lessons that you can apply immediately to your own projects. You’ll learn to:• Master the iWork suite of tools quickly through fun, real-world projects• Design a Keynote presentation from storyboard to Web export • Add animated charts and custom backgrounds to a presentation with ease• Publish great-looking newsletters and brochures in print and on the Web• Build a professional marketing package from scratch• Create expense reports, track budgets, and plan special events• Sort, organize, and chart data using sophisticated spreadsheet calculationsThe Apple Training Series is both a self-paced learning tool and the official curriculum of the Apple Training and Certification Program. To find out more about Apple Training, or to find an Authorized Training Center near you, go to www.apple.com/training.

Satellite Remote Sensing for Archaeology


Sarah Parcak - 2009
    It provides a survey of the history and development of the field, connecting satellite remote sensing in archaeology to broader developments in remote sensing, archaeological method and theory, cultural resource management, and environmental studies. With a focus on practical uses of satellite remote sensing, Sarah H. Parcak evaluates satellite imagery types and remote sensing analysis techniques specific to the discovery, preservation, and management of archaeological sites.Case studies from Asia, Central America, and the Middle East are explored, including Xi’an, China; Angkor Wat, Cambodia and Egypt’s floodplains. In-field surveying techniques particular to satellite remote sensing are emphasized, providing strategies for recording ancient features on the ground observed from space. The book also discusses broader issues relating to archaeological remote sensing ethics, looting prevention, and archaeological site preservation. New sensing research is included and illustrated with the inclusion of over 160 satellite images of ancient sites.

A First Course in Bayesian Statistical Methods


Peter D. Hoff - 2009
    and examples.- Belief, probability and exchangeability.- One-parameter models.- Monte Carlo approximation.- The normal model.- Posterior approximation with the Gibbs sampler.- The multivariate normal model.- Group comparisons and hierarchical modeling.- Linear regression.- Nonconjugate priors and Metropolis-Hastings algorithms.- Linear and generalized linear mixed effects models.- Latent variable methods for ordinal data.

SpecLab: Digital Aesthetics and Projects in Speculative Computing


Johanna Drucker - 2009
    In SpecLab she explores the implications of these radical efforts to use critical practices and aesthetic principles against the authority of technology based on analytic models of knowledge.            Inspired by the imaginative frontiers of graphic arts and experimental literature and the technical possibilities of computation and information management, the projects Drucker engages range from Subjective Meteorology to Artists’ Books Online to the as yet unrealized ’Patacritical Demon, an interactive tool for exposing the structures that underlie our interpretations of text. Illuminating the kind of future such experiments could enable, SpecLab functions as more than a set of case studies at the intersection of computers and humanistic inquiry. It also exemplifies Drucker’s contention that humanists must play a role in designing models of knowledge for the digital age—models that will determine how our culture will function in years to come.