Book picks similar to
Apache Web Server Administration & E Commerce Handbook by Scott Hawkins
computersandprogr<br/>amming
programming
wanted
and
Windows Powershell in Action
Bruce Payette - 2007
In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.
Windows Presentation Foundation Unleashed
Adam Nathan - 2006
Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications
HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications
Juan Diego Gauchat
Principles of Information Systems
Ralph M. Stair - 1992
The overall vision, framework, and pedagogy that made the previous editions so popular has been retained, making this a highly comprehensive IS text. Accomplished authors Ralph Stair and George Reynolds continue to expose their readers to clear learning objectives that are reinforced by timely, real-world business examples and hands-on activities. Regardless of their major, students can use this book to understand and practice fundamental IS principles so that they can function more efficiently and effectively as workers, managers, decision makers, and organizational leaders.
A Whirlwind Tour of Python
Jake Vanderplas - 2016
This report provides a brief yet comprehensive introduction to Python for engineers, researchers, and data scientists who are already familiar with another programming language.Author Jake VanderPlas, an interdisciplinary research director at the University of Washington, explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.You’ll explore:- Python syntax basics and running Python codeBasic semantics of Python variables, objects, and operators- Built-in simple types and data structures- Control flow statements for executing code blocks conditionally- Methods for creating and using reusable functionsIterators, list comprehensions, and generators- String manipulation and regular expressions- Python’s standard library and third-party modules- Python’s core data science tools- Recommended resources to help you learn more
The Modern Web: Multi-Device Web Development with HTML5, CSS3, and JavaScript
Peter Gasston - 2013
When users can browse the Web on a three-inch phone screen as easily as on a fifty-inch HDTV, what's a developer to do?Peter Gasston's The Modern Web will guide you through the latest and most important tools of device-agnostic web development, including HTML5, CSS3, and JavaScript. His plain-English explanations and practical examples emphasize the techniques, principles, and practices that you'll need to easily transcend individual browser quirks and stay relevant as these technologies are updated.Learn how to:Plan your content so that it displays fluidly across multiple devices Design websites to interact with devices using the most up-to-date APIs, including Geolocation, Orientation, and Web Storage Incorporate cross-platform audio and video without using troublesome plug-ins Make images and graphics scalable on high-resolution devices with SVG Use powerful HTML5 elements to design better formsTurn outdated websites into flexible, user-friendly ones that take full advantage of the unique capabilities of any device or browser. With the help of The Modern Web, you'll be ready to navigate the front lines of device-independent development.
Double Lucky: Goddess of Vengeance and Drop Dead Beautiful
Jackie Collins - 2015
DROP DEAD BEAUTIFUL
From Miami to Beverly Hills, from Mexico City to Acapulco to Las Vegas, dynamically sexy Lucky Santangelo and sweet-as-sin daughter, Max, are turning up the heat. So is Anthony Bonar, the son of Lucky's one-time godfather and lethal enemy, Enzio Bonatti. Lucky is preparing for the opening of her multibillion-dollar hotel complex in Las Vegas, The Keys, but Bonar-a vicious killer-is out to stop her any way he can. Meanwhile, sixteen-year-old Max has run off to Big Bear with a man she's met on the Internet. But he turns out to be a vengeful predator with a long-standing grudge against Lucky... So begins a non-stop thrill ride as Lucky builds her dream resort-and Max follows her dreams, and proves she's more than just a little Lucky. She's a kick-ass survivor.
GODDESS OF VENGEANCE
Passion. Beauty. Brains. Success. Lucky has everything her name implies. And as the force behind a high-profile casino and hotel complex, Lucky has exactly what billionaire businessman Armand Jordan is determined to take from her-and he's not afraid to play dirty. Meantime, Lucky's son Bobby is dealing with shady Russian investors and a hot new girlfriend, who happens to be a deputy D.A. While teenage Max is busy embarking on an affair with a sexy young movie star. It's business as usual for the Santangelo clan...But this time, it just might take more than Lady Luck for them all to come out on top.Jackie Collins knows a thing or two about life in the fast lane [with] her wry sense of humor and spitfire approach. -BazaarThis edition of the book is the deluxe, tall rack mass market paperback.
Mission Pack 4: Missions 13-16
J.S. Morin - 2017
With the weight of his conscience growing by the mission and a fiancee who makes him want to be a better man, Carl Ramsey decides to try his hand at being one of the good guys. But there's a long line of enemies who won't forget so easily. Mission 13: Mission Inadvisable The Mobius crew gets a job offer so vile they not only turn it down, they set out to stop the secretive crime lord doing the hiring. Along the way, they manage to accidentally double-cross an old friend. Sometimes, no matter what you try, you're destined to be on the wrong side of the law. Mission 14: Moral and Orbital Decay Mort's son is on the run from the Convocation. He's fled to a remote mining station and looking for a quick ride from his father's old crew. But when magic gets out of hand, suddenly everyone's more concerned about stopping the space station from crashing into a planet than finding a fugitive. Mission 15: Planet Hustlers Pirates capture the stunnji homeworld, and Rai Kub's people turn to Carl Ramsey to find a way to convince them to leave. Carl's plan? A lot of fast talking, subterfuge, and the crookedest game of poker ever played. The stakes: the fate of a refugee planet. Mission 16: Eternity or Bust When your bride-to-be makes a simple request, a smart man makes it happen. When your outlaw fiancee wants her wedding on Earth, where most of the galaxy's top law enforcement agencies are headquartered, it's going to take bribery, back room deals, and ratting out some old associates. But Carl won't be able to live with himself unless he gets his friends out of the jam he puts them in. Bonus Short Story: For Old Time's Sake With retirement in full force, the crew of the Mobius take on a decidedly low-key villain: the interlopers who're looking to ruin their gig hustling simulator combat for free meals.
The LogStash Book
James Turnbull - 2013
We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.
PHP Pocket Reference
Rasmus Lerdorf - 2000
The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.
JavaScript and HTML5 Now
Kyle Simpson - 2012
This insightful overview provides striking examples of how these technologies have teamed up to give the Web a truly open platform.Author Kyle Simpson (HTML5 Cookbook) shows you how JavaScript unlocks the power of all of the new functionality in HTML5, giving web applications the capabilities developers have wanted for years. These technologies now provide the raw tools you need in the presentation layer to replace everything you used to do with Flash.You’ll discover how:> HTML5 builds natively into the web platform things we find most commonly useful, such as audio, video, and drawing> The Canvas element is changing graphic animations, games, audio visualization, charting, and video effects> Geolocation has spawned “geofencing” and augmented reality> Web Workers allows calculations to be performed in the background, rather than compete with the UI> Web Sockets is enabling realtime communication for chat, live tech support, multi-user collaboration, and gaming> Mobile device APIs will give web apps direct access the phone’s camera, vibration, and other capabilities
The Definitive Guide to Drupal 7
Benjamin MelanconRoy Scholten - 2010
Written by a panel of expert authors, the book covers every aspect of Drupal, from planning a successful project all the way up to making a living from designing Drupal sites and to contributing to the Drupal community yourself. With this book you will:Follow practical approaches to solving many online communication needs with Drupal with real examples. Learn how to keep learning about Drupal: administration, development, theming, design, and architecture. Go beyond the code to engage with the Drupal community as a contributing member and to do Drupal sustainably as a business.The Definitive Guide to Drupal 7 was written by the following team of expert Drupal authors:Benjamin Melançon, Jacine Luisi, Károly Négyesi, Greg Anderson, Bojhan Somers, Stéphane Corlosquet, Stefan Freudenberg, Michelle Lauer, Ed Carlevale, Florian Lorétan, Dani Nordin, Ryan Szrama, Susan Stewart, Jake Strawn, Brian Travis, Dan Hakimzadeh, Amye Scavarda, Albert Albala, Allie Micka, Robert Douglass, Robin Monks, Roy Scholten, Peter Wolanin, Kay VanValkenburgh, Greg Stout, Kasey Qynn Dolin, Mike Gifford, Claudina Sarahe, Sam Boyer, and Forest Mars, with contributions from George Cassie, Mike Ryan, Nathaniel Catchpole, and Dmitri Gaskin.For more information, check out the Drupaleasy podcast #63, in which author Benjamin Melançon discusses The Definitive Guide to Drupal 7 in great detail:http: //drupaleasy.com/podcast/2011/08/drupal...
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Darknet: A Beginner's Guide to Staying Anonymous
Lance Henderson - 2012
This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic