Podcasting For Dummies


Tee Morris - 2005
    You can podcast to boost your business, promote your passion, share your opinions, or just have fun. The point is to say what you want to say to those who want to hear it. With step-by-step explanations, screen shots, and tons of examples, this guide clues you in on recording, producing, and hosting your very own podcast with info on:Finding your voice and your niche, whether you want to talk tech, make your own kinds of music, educate listeners, make people laugh, do soundseeing tours, serialize your novel, or invent a new podcasting genre Getting the bare necessities (if you don't already have them), including a microphone, recording software, and an audio card Audio editing software such as Audacity, Cakewalk for PCs, GarageBand for musicality, and Audio HiJack Pro for Macs Recording, including understanding dB (decibel levels), capturing or minimizing ambient noise, and more Editing with GarageBand or Audacity, adding bed music, and including intros and outros for a signature finishing touch You want your podcast to be heard. Podcasting For Dummies helps you launch and promote it with info on how to:Downsize your audio files with MP3 compression Change bit rates and sample rates in Audacity and iTunes Create and edit your ID3 tags in Audacity or iTunes Post your show notes using Movable Type or Libsyn Simplify the RSS 2.0 feed by using blogging software or a podcast-hosting company such as Audioblog.com, Podcastamatic, and Feeder Ping for publicity Communicate with your listeners on your blog, through online discussion groups such as Yahoo! Groups or Google Groups, or on online forums Of course, if you want to be a podcatcher (a listener) and subscribe to podcasts, this guide shows you how to do that, too! Complete with a companion podcast--a free weekly audio commentary that will keep you up to speed on the podsphere--this guide helps you get your message heard, loud and clear.

The Explosive Child: A New Approach for Understanding and Parenting Easily Frustrated, Chronically Inflexible Children


Ross W. Greene - 1998
    An experienced therapist offers groundbreaking and compassionate techniques for helping chronically inflexible children, who suffer from excessively immoderate tempers, showing how brain-based deficits contribute to these problems and offering positive and constructive ways to calm things down.

Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines


Ed Rosenthal - 2014
    Prohibition’s end has led to a technological revolution that’s generated powerful medicines and products containing almost zero carcinogens and little smoke. Marijuana icon Ed Rosenthal and leading cannabis reporter David Downs guide readers through the best new consumer products, and demonstrate how to make and use the safest, cleanest extracts. Beyond Buds details how award-winning artisans make hash and concentrates, and includes modern techniques utilizing dry ice and CO2. The book is a primer on making kief, water hash, tinctures, topicals, edibles, and other extracts from cannabis leaves, trim, and bud bits, and it goes on to explore and simplify the more exotic and trendy marijuana-infused products, such as butane hash oil (BHO), shatter, wax, and budder. More complex than lighting a joint, these innovative products call for new accessories — special pipes, dabbing tools, and vaporizers — all of which are reviewed and pictured in the book. Beyond Buds expands on Rosenthal’s previous book Ask Ed: Marijuana Gold: Trash to Stash. Completely updated with full-color photographs that are both “how-to” guides and eye candy, this book enables not only the health-conscious toker but also the bottom line–driven cultivator.

The Art of Deception: Controlling the Human Element of Security


Kevin D. Mitnick - 2001
    Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Mindstorms: Children, Computers, And Powerful Ideas


Seymour Papert - 1980
    We have Mindstorms to thank for that. In this book, pioneering computer scientist Seymour Papert uses the invention of LOGO, the first child-friendly programming language, to make the case for the value of teaching children with computers. Papert argues that children are more than capable of mastering computers, and that teaching computational processes like de-bugging in the classroom can change the way we learn everything else. He also shows that schools saturated with technology can actually improve socialization and interaction among students and between students and teachers.

Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement


Eric Redmond - 2012
    As a modern application developer you need to understand the emerging field of data management, both RDBMS and NoSQL. Seven Databases in Seven Weeks takes you on a tour of some of the hottest open source databases today. In the tradition of Bruce A. Tate's Seven Languages in Seven Weeks, this book goes beyond your basic tutorial to explore the essential concepts at the core each technology. Redis, Neo4J, CouchDB, MongoDB, HBase, Riak and Postgres. With each database, you'll tackle a real-world data problem that highlights the concepts and features that make it shine. You'll explore the five data models employed by these databases-relational, key/value, columnar, document and graph-and which kinds of problems are best suited to each. You'll learn how MongoDB and CouchDB are strikingly different, and discover the Dynamo heritage at the heart of Riak. Make your applications faster with Redis and more connected with Neo4J. Use MapReduce to solve Big Data problems. Build clusters of servers using scalable services like Amazon's Elastic Compute Cloud (EC2). Discover the CAP theorem and its implications for your distributed data. Understand the tradeoffs between consistency and availability, and when you can use them to your advantage. Use multiple databases in concert to create a platform that's more than the sum of its parts, or find one that meets all your needs at once.Seven Databases in Seven Weeks will take you on a deep dive into each of the databases, their strengths and weaknesses, and how to choose the ones that fit your needs.What You Need: To get the most of of this book you'll have to follow along, and that means you'll need a *nix shell (Mac OSX or Linux preferred, Windows users will need Cygwin), and Java 6 (or greater) and Ruby 1.8.7 (or greater). Each chapter will list the downloads required for that database.

Ruby Under a Microscope


Pat Shaughnessy - 2012
    Author Pat Shaughnessy takes a scientific approach, laying out a series of experiments with Ruby code to take you behind the scenes of how programming languages work. You'll even find information on JRuby and Rubinius (two alternative implementations of Ruby), as well as in-depth explorations of Ruby's garbage collection algorithm. Ruby Under a Microscope will teach you:How a few computer science concepts underpin Ruby's complex implementation How Ruby executes your code using a virtual machine How classes and modules are the same inside Ruby How Ruby employs algorithms originally developed for Lisp How Ruby uses grammar rules to parse and understand your code How your Ruby code is translated into a different language by a compilerNo programming language needs to be a black box. Whether you're already intrigued by language implementation or just want to dig deeper into Ruby, you'll find Ruby Under a Microscope a fascinating way to become a better programmer. Covers Ruby 2.x, 1.9 and 1.8

CK-12 Earth Science


Jean Brainard - 2010
    

Betty Crocker Cookbook, 12th Edition: Everything You Need to Know to Cook from Scratch (Betty Crocker's Cookbook)


Betty Crocker - 2011
    Few books have stood the test of time like the Betty Crocker Cookbook; none have kept up as well with the times and how people cook today. Classic meets contemporary in the 12th edition, with 1,500 recipes, all from scratch, over one-third new, and more than 1,000 photos.This one-stop resource bursts with kitchen information and guidance as only Betty Crocker can deliver. Learn to make a lattice crust, master a braise, can pickles, and even debone a fish via hundreds of how-to photos. Discover new ingredients organized by region, such as Middle Eastern or Indian, in vibrant ID photos. New and expanded chapters on one-dish meals, beverages, DIY foods, whole grains, and vegetarian cooking reflect what today’s budding cooks want to eat, as do recipes such as Baba Ganoush, Short Rib Ragu, Pho, Korean Fried Chicken, Cold-Brew Iced Coffee, Cauliflower Steaks, Smoked Beef Brisket, Quinoa Thumbprint Cookies, and Doughnuts. And complete nutrition is included with every recipe.

301 Smart Answers to Tough Interview Questions


Vicky Oliver - 2005
    If you want to stand a head above the rest of the pack, 301 Smart Answers to Tough Interview Questions is the definitive guide you need to the real, and sometimes quirky, questions employers are using to weed out candidates.Do you know the best answers to:--It looks like you were fired twice. How did that make you feel?--Do you know who painted this work of art? --What is the best-managed company in America?--If you could be any product in the world, what would you choose?--How many cigars are smoked in a year?--Are you a better visionary or implementer? Why?Leaning on her own years of experience and the experiences of more than 5,000 recent candidates, Vicky Oliver shows you how to finesse your way onto a company's payroll."Everything I always wanted to know about job interviews but was afraid to be asked."-Claude Chene, Senior Vice President, Head of Business Development, U.K. and Europe, Sanford Bernstein & Co.

Real World Haskell: Code You Can Believe In


Bryan O'Sullivan - 2008
    You'll learn how to use Haskell in a variety of practical ways, from short scripts to large and demanding applications. Real World Haskell takes you through the basics of functional programming at a brisk pace, and then helps you increase your understanding of Haskell in real-world issues like I/O, performance, dealing with data, concurrency, and more as you move through each chapter. With this book, you will:Understand the differences between procedural and functional programming Learn the features of Haskell, and how to use it to develop useful programs Interact with filesystems, databases, and network services Write solid code with automated tests, code coverage, and error handling Harness the power of multicore systems via concurrent and parallel programming You'll find plenty of hands-on exercises, along with examples of real Haskell programs that you can modify, compile, and run. Whether or not you've used a functional language before, if you want to understand why Haskell is coming into its own as a practical language in so many major organizations, Real World Haskell is the best place to start.

The UNIX-Haters Handbook


Simson Garfinkel - 1994
    It is a humorous book--pure entertainment--that maintains that UNIX is a computer virus with a user interface. It features letters from the thousands posted on the Internet's "UNIX-Haters" mailing list. It is not a computer handbook, tutorial, or reference. It is a self-help book that will let readers know they are not alone.

The Einstein Theory of Relativity


Hendrik Antoon Lorentz - 2004
    The books published on the subject are so technical that only a person trained in pure physics and higher mathematics is able to fully understand them. In order to make a popular explanation of this far-reaching theory available, the present book is published.

NurtureShock: New Thinking About Children


Po Bronson - 2008
    In a world of modern, involved, caring parents, why are so many kids aggressive and cruel?  Where is intelligence hidden in the brain, and why does that matter?  Why do cross-racial friendships decrease in schools that are more integrated?  If 98% of kids think lying is morally wrong, then why do 98% of kids lie?  What's the single most important thing that helps infants learn language?NurtureShock is a groundbreaking collaboration between award-winning science journalists Po Bronson and Ashley Merryman.  They argue that when it comes to children, we've mistaken good intentions for good ideas.  With impeccable storytelling and razor-sharp analysis, they demonstrate that many of modern society's strategies for nurturing children are in fact backfiring--because key twists in the science have been overlooked.Nothing like a parenting manual, the authors' work is an insightful exploration of themes and issues that transcend children's (and adults') lives.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.