Book picks similar to
Moving to zsh by Armin Briegel


programming
computer
computers
ebooks

When We Are Called to Part: Hope and Heartbreak in the Vanishing World of the Kalaupapa Leprosy Settlement


Brooke Jarvis - 2013
    Once it had been a forbidding place of exile, inhabited by thousands of the disease’s victims who had been removed from their families and confined against their will, far away from a society that feared and misunderstood their condition. When Brooke Jarvis came across a posting for a job in Kalaupapa, tending to the needs of the handful of remaining patients, it seemed like an impossibly exotic opportunity for a college student. But what she found there was both more remarkable and more familiar than what she had imagined. When We Are Called to Part is the absorbing, affecting, and often funny story of life in the last years of a rapidly vanishing community. “Even a prison,” she would learn, “eventually becomes a home, becomes something you mourn.”

Free Tools for Writers, Bloggers and Solopreneurs


Karen Banes - 2014
     By the time you finish this book you'll be able to do everything from checking your grammar, to creating an infographic, to driving free traffic to your blog or website, all using free tools, sites and downloads. The book contains links to all resources mentioned. A handy little reference guide you'll keep on your Kindle or other device to refer back to again and again.

MacBook For Dummies


Mark L. Chambers - 2006
    In addition to the freedom to work wherever you happen to be, a MacBook offers youA portable darkroom with iPhoto Mobile music, podcasts, and Internet radio GarageBand software that lets you make your own music The ability to create and share original movies and DVDs Safari, a safer and ultra-cool Web browser, and all the other OS X advantages Whether you already have your new MacBook or are still weighing the pros and cons of various models, MacBook For Dummies is a valuable resource. For newcomers to laptop land, it's packed with basic information about using and caring for Mac laptops. It also walks you through Mac OS X, the revolutionary Macintosh operating system that makes your laptop tick. Then it's on to all the fun stuff you can do with your MacBook, like making music, editing photos and turning them into a book, creating DVDs on the road, or adding a wireless keyboard. MacBook For Dummies will help youSet up your MacBook and get acquainted with all the features of the Mac OS X Tiger operating system Use the Safari Web browser and Apple's .Mac Internet subscriber service, connect your MacBook to a printer, and communicate with your cell phone or PDA Connect to a wired or wireless network Make the most of the iLife applications that come with your MacBook--iTunes, iPhoto, iMovie HD, iDVD, and GarageBand Keep your MacBook and your data safe, troubleshoot any problems, and maintain your system Popular For Dummies author Mark Chambers has loaded this fun book with tips, ideas, and his famous "Mark's Maxims"--power user advice that will guide you around the pitfalls and make you a Macxpert in no time. From latptop basics all the way to upgrading and adding memory, MacBook For Dummies will be your MacBook's best friend.

The Disappearance of the USS Scorpion: The History of the Mysterious Sinking of the American Nuclear Submarine


Charles River Editors - 2016
    Nothing in those investigations caused the Navy to change its conclusion that an unexplained catastrophic event occurred.” – Excerpt from a Navy report It takes a special type of person to serve in a nation’s navy, especially on long voyages that separate men and women from their loved ones, and no service is both loved and hated as that aboard submarines, for very few people ever serve on them on a whim. For one thing, the psychological impact of being trapped for long periods underwater in tight, cramped quarters is more than many people can stand. Also, submarine service is uncharacteristically hazardous; after all, if a surface vessel is sunk, the crew has a reasonable chance of escaping death in lifeboats or being rescued out of the water by another ship. Conversely, if a submarine is badly damaged while submerged, the crew’s chances of survival are at best remote. On the other hand, for those who choose to make the careers as submariners, there is no more beloved service. That is, one hopes, how it was for the 99 men who were serving on the USS Scorpion on May 22, 1968, the fateful day the submarine is believed to have sank. It appears that the crew members died quickly, but however it happened, the grief experienced by their family members dragged on for decades, exacerbated both by the Navy’s lack of information about the submarine’s final moments and the government’s unwillingness to share what little knowledge it had. It is easy in hindsight to criticize the military for its secrecy, but it must be remembered that the Scorpion disappeared at the height of the Cold War, and therefore, little could be said publicly about its fate. Coincidentally, 3 other nuclear submarines suffered mysterious sinkings the same year, and the Cold War adversaries were interested in locating them and gleaning any secrets or technology that they could from the other side’s bad luck. Indeed, it was only after the fall of the Soviet Union that the truth could be told, bringing closure to family members and a dark lesson in espionage to the American people. The Disappearance of the USS Scorpion: The History of the Mysterious Sinking of the American Nuclear Submarine looks at one of the Navy’s enduring mysteries. Along with pictures of important people, places, and events, you will learn about the USS Scorpion like never before.

Jamestown


Marshall William Fishwick - 2017
    They would establish a British colony, find gold, and discover a water route to Asia. But what awaited them was far different - fire, hunger, sickness, death, even cannibalism. Here, from the noted historian Marshall W. Fishwick, is the dramatic story of Jamestown and the struggle of its leader, Captain John Smith, who, with the help of Pocahontas, daughter of the Algonquian chief Powhatan, succeeded against all odds.

Beyond the Twelve-Factor App Exploring the DNA of Highly Scalable, Resilient Cloud Applications


Kevin Hoffman - 2016
    Cloud computing is rapidly transitioning from a niche technology embraced by startups and tech-forward companies to the foundation upon which enterprise systems build their future. In order to compete in today’s marketplace, organizations large and small are embracing cloud architectures and practices.

Ferdinand and Isabella


Malveena McKendrick - 2015
    But the historic landfall of October 1492 was only a secondary event of the year. The preceding January, they had accepted the surrender of Muslim Granada, ending centuries of Islamic rule in their peninsula. And later that year, they had ordered the expulsion or forced baptism of Spain's Jewish minority, a cruel crusade undertaken in an excess of zeal for their Catholic faith. Europe, in the century of Ferdinand and Isabella, was also awakening to the glories of a new age, the Renaissance, and the Spain of the "Catholic Kings" - as Ferdinand and Isabella came to be known - was not untouched by this brilliant revival of learning. Here, from the noted historian Malveena McKendrick, is their remarkable story.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users


Christopher Negus - 2007
    Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

How to Write Great Characters: The Key to Your Hero's Growth and Transformation


David Wisehart - 2015
     You will learn the ancient secrets of human psychology: the nine fundamental fears that motivate human behavior the nine core character types the nine stages of character change and so much more Complete beginners and seasoned veterans will benefit greatly from this material. You don’t even have to be a writer. The only requirement is that you come open-minded and ready to learn. About story. About character. And about yourself. Scroll up and get your copy now. What readers are saying… "Highly recommended to the writer wanting an effective tool to help develop believable characters." ~ Amazon Andy "Full of useful ideas." ~ Untamed Pen "Great book—must have for creating characters and developing plot around them!" ~ Susan Mi "Great jumping off point for characters and arcs." ~ Gail Clifford "I heartily recommend this book as a great tool for all writers." ~ Harry Rankin "A wonderful book." ~ Candace Segar "Gave me that AHA! moment of epiphany. I would recommend this book." ~ Dcortez "A great piece for new and veteran writers suffering from character block." ~ Cullen "They don't get better than this. It will fix your story and possibly your life." ~Amazon Customer Scroll up and grab your copy today. Scroll up and get your copy now.

Adventures In Raspberry Pi (Adventures In ...)


Carrie Anne Philbin - 2013
    Written for 11- to 15-year-olds and assuming no prior computing knowledge, this book uses the wildly successful, low-cost, credit-card-sized Raspberry Pi computer to explain fundamental computing concepts. Young people will enjoy going through the book's nine fun projects while they learn basic programming and system administration skills, starting with the very basics of how to plug in the board and turn it on. Each project includes a lively and informative video to reinforce the lessons. It's perfect for young, eager self-learners—your kids can jump in, set up their Raspberry Pi, and go through the lessons on their own. Written by Carrie Anne Philbin, a high school teacher of computing who advises the U.K. government on the revised ICT Curriculum Teaches 11- to 15-year-olds programming and system administration skills using Raspberry Pi Features 9 fun projects accompanied by lively and helpful videos Raspberry Pi is a $35/£25 credit-card-sized computer created by the non-profit Raspberry Pi Foundation; over a million have been sold Help your children have fun and learn computing skills at the same time with Adventures in Raspberry Pi.

JavaScript and HTML5 Now


Kyle Simpson - 2012
    This insightful overview provides striking examples of how these technologies have teamed up to give the Web a truly open platform.Author Kyle Simpson (HTML5 Cookbook) shows you how JavaScript unlocks the power of all of the new functionality in HTML5, giving web applications the capabilities developers have wanted for years. These technologies now provide the raw tools you need in the presentation layer to replace everything you used to do with Flash.You’ll discover how:> HTML5 builds natively into the web platform things we find most commonly useful, such as audio, video, and drawing> The Canvas element is changing graphic animations, games, audio visualization, charting, and video effects> Geolocation has spawned “geofencing” and augmented reality> Web Workers allows calculations to be performed in the background, rather than compete with the UI> Web Sockets is enabling realtime communication for chat, live tech support, multi-user collaboration, and gaming> Mobile device APIs will give web apps direct access the phone’s camera, vibration, and other capabilities

Social Skills: Top 10 Mistakes That Destroy Your Charisma… and How to Avoid Them


Stuart Killan - 2018
    The people walking past her stopped in their tracks and recognized that a star was in their midst.In an instant, fans engulfed Marilyn and it took some time for the photographer to protect her from the crowd.Marilyn knew that charisma is something you can turn on and off.And even if you’re making all the mistakes inside, the short simple guide will show you how to fix them. The #1 charisma myth everyone believes, and why it’s false Introverts can’t be charismatic – think again The real truth about charisma At a party someone - here’s what not to do when introducing them Charisma secrets from a 300 year old novel The Dale Carnegie method (taught to millions) to be instantly memorable 5 conversation tips you can use to talk to anyone So if you want to be someone with a “magnetic presence”Where people are actually excited to talk to you… Scroll up and hit “buy now with 1 click” to receive your book instantly

Hello World: Being Human in the Age of Algorithms


Hannah Fry - 2018
    It’s time we stand face-to-digital-face with the true powers and limitations of the algorithms that already automate important decisions in healthcare, transportation, crime, and commerce. Hello World is indispensable preparation for the moral quandaries of a world run by code, and with the unfailingly entertaining Hannah Fry as our guide, we’ll be discussing these issues long after the last page is turned.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.