Pragmatic Version Control Using Git


Travis Swicegood - 2008
    High-profile projects such as the Linux Kernel, Mozilla, Gnome, and Ruby on Rails are now using Distributed Version Control Systems (DVCS) instead of the old stand-bys of CVS or Subversion.Git is a modern, fast, DVCS. But understanding how it fits into your development can be a daunting task without an introduction to the new concepts. Whether you're just starting out as a professional programmer or are an old hand, this book will get you started using Git in this new distributed world. Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables you to work more efficiently in our increasingly mobile society. It then progresses through the basics necessary to get started using Git.You'll get a thorough overview of how to take advantage of Git. By the time you finish this book you'll have a firm grounding in how to use Git, both by yourself and as part of a team.Learn how to use how to use Git to protect all the pieces of your project Work collaboratively in a distributed environment Learn how to use Git's cheap branches to streamline your development Install and administer a Git server to share your repository

Ten Arguments For Deleting Your Social Media Accounts Right Now


Jaron Lanier - 2018
    In Ten Arguments For Deleting Your Social Media Accounts Right Now Jaron Lanier draws on his insider's expertise to explain precisely how social media works and why its cruel and dangerous effects are at the heart of its current business model and design. As well as offering ten simple arguments for liberating yourself from its addictive hold, his witty and urgent manifesto outlines a vision for an alternative that provides all the benefits of social media without the harm. nicer person in the process.

Cyberphobia: Identity, Trust, Security and the Internet


Edward Lucas - 2015
    Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.

The Unified Software Development Process


Ivar Jacobson - 1999
    This book demonstrates how the notation and process complement one another, using UML models to illustrate the new process in action. It describes the constructs such as use cases, actors, and more.

Next: The Future Just Happened


Michael Lewis - 2001
    In the midst of one of the greatest status revolutions in the history of the world, the Internet has become a weapon in the hands of revolutionaries. Old priesthoods are crumbling. In the new order, the amateur is king: fourteen-year-olds manipulate the stock market and nineteen-year-olds take down the music industry. Unseen forces undermine all forms of collectivism, from the family to the mass market: one black box has the power to end television as we know it, and another one may dictate significant changes in our practice of democracy. With a new afterword by the author.

Facebook Marketing for Dummies


Paul Dunay - 2009
    With Facebook, an organization can market and promote their brand, products, or services via the network's built-in components of profile pages, polls, community building, advertising, word-of-mouth marketing, and business applications. This insightful resource focuses on the strategies, tactics, and techniques necessary to lead your organization into the world of Facebook marketing.Packed with vital real-world case studies, the book serves as a must-have guide for the most reliable, responsible, and ethical business and marketing practices with Facebook.A helpful reference that discusses essential strategies, tactics, and techniques for excelling in the world of Facebook marketing Examines setting up a business profile page, hosting an event on Facebook, and tracking your return-on-investment Shares strategies for successful Facebook advertising campaigns Demonstrates how to create widgets and Facebook applications Face it: this essential book contains everything you need to know for your foray into Facebook marketing.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Infinite Loop: How Apple, the World's Most Insanely Great Computer Company, Went Insane


Michael S. Malone - 1999
    How did Apple lose its way? Why did the world still care so deeply about a company that had lost its leadership position? Michael S. Malone, from the unique vantage point of having grown up with the company's founders, and having covered Apple and Silicon Valley for years, sets out to tell the gripping behind-the-scenes story - a story that is even zanier than the business world thought. In essence, Malone claims, with only a couple of incredible inventions (the Apple II and Macintosh), and backed by an arrogance matched only by its corporate ineptitude, Apple managed to create a multibillion-dollar house of cards. And, like a faulty program repeating itself in an infinite loop, Apple could never learn from its mistakes. The miracle was not that Apple went into free fall, but that it held up for so long. Within the pages of Infinite Loop, we discover a bruising portrait of the megalomaniacal Steve Jobs and an incompetent John Sculley, as well as the kind of political backstabbings, stupid mistakes, and overweening egos more typical of a soap opera than a corporate history.

Mortal Fear


Greg Iles - 1997
    But at night, Harper serves as system operator for E.R.O.S., a highly exclusive, sexually explicit on-line service whose clients range from the glitterati of Hollywood to the literati of New York. Shielded by a guarantee of absolute anonymity, these clients pour their secrets into the digital confession box of E.R.O.S. Only "sysops" like Harper - the high priests of the system - know and see all. When six female clients inexplicably drop off the network, Harper suspects that something is amiss. But when a world-famous New Orleans author - and E.R.O.S. client - is decapitated in her mansion, Harper breaks the code of silence and contacts the police. They are as shocked as Harper to learn that all six women have been brutally murdered, each with a different weapon, and in a different city. And each time the killer has claimed the same bizarre trophy. Horrified to find himself the prime suspect in the murders he reported, Harper is swept into a secret manhunt led by the FBI's Investigative Support Unit. While the FBI uses the technology of the future and the psychology of the past to trap the brilliant killer, Harper realizes that he alone stands a chance of luring the elusive madman into the open.

Margot Mertz Takes It Down


Carrie McCrossen - 2021
    From secret embarrassing DM's to viral videos and more, Margot cleans it all. After her parents foolishly lost her college fund, this is the only way she can make it to Stanford.But when a fellow student comes to her asking her to take down a website that's gathering nude pics of fellow Roosevelt High girls, things get personal. Margot must delve into the depths of her school to take down the culprit. The seedy underbelly of Roosevelt High is not unfamiliar to Margot--but somehow this case is stumping her at every turn--until she figures out that the only way to reach her suspects is to get close to perfect boy Avery Green. His access to every club, volunteer opportunity, sports team, and popular party is the key to solving her case.When the case takes a shocking turn, Margot's ready to burn the whole world down. No one targets the Roosevelt High girls on Margot's watch. Mertz Clean Your Filth is on the case.

Absolute Freebsd: The Complete Guide to Freebsd


Michael W. Lucas - 2007
    But it can be even trickier to use than either Unix or Linux, and harder still to master.Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for both servers and clients Monitor your system with performance-testing and troubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network management system. Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.

Erlang and OTP in Action


Martin Logan - 2010
    Multi-core processors and the increasing demand for maximum performance and scalability in mission-critical applications have renewed interest in functional languages like Erlang that are designed to handle concurrent programming. Erlang, and the OTP platform, make it possible to deliver more robust applications that satisfy rigorous uptime and performance requirements.Erlang and OTP in Action teaches you to apply Erlang's message passing model for concurrent programming--a completely different way of tackling the problem of parallel programming from the more common multi-threaded approach. This book walks you through the practical considerations and steps of building systems in Erlang and integrating them with real-world C/C++, Java, and .NET applications. Unlike other books on the market, Erlang and OTP in Action offers a comprehensive view of how concurrency relates to SOA and web technologies.This hands-on guide is perfect for readers just learning Erlang or for those who want to apply their theoretical knowledge of this powerful language. You'll delve into the Erlang language and OTP runtime by building several progressively more interesting real-world distributed applications. Once you are competent in the fundamentals of Erlang, the book takes you on a deep dive into the process of designing complex software systems in Erlang. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.

MongoDB Applied Design Patterns


Rick Copeland - 2013
    You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process.Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including:Operational intelligence: Perform real-time analytics of business dataEcommerce: Use MongoDB as a product catalog master or inventory management systemContent management: Learn methods for storing content nodes, binary assets, and discussionsOnline advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and biddingSocial networking: Learn how to store a complex social graph, modeled after Google+Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game

Developing Backbone.js Applications


Addy Osmani - 2012
    You’ll learn how to create structured JavaScript applications, using Backbone’s own flavor of model-view-controller (MVC) architecture.Start with the basics of MVC, SPA, and Backbone, then get your hands dirty building sample applications—a simple Todo list app, a RESTful book library app, and a modular app with Backbone and RequireJS. Author Addy Osmani, an engineer for Google’s Chrome team, also demonstrates advanced uses of the framework.Learn how Backbone.js brings MVC benefits to the client-sideWrite code that can be easily read, structured, and extendedWork with the Backbone.Marionette and Thorax extension frameworksSolve common problems you’ll encounter when using Backbone.jsOrganize your code into modules with AMD and RequireJSPaginate data for your Collections with the Backbone.Paginator pluginBootstrap a new Backbone.js application with boilerplate codeUse Backbone with jQuery Mobile and resolve routing problems between the twoUnit-test your Backbone apps with Jasmine, QUnit, and SinonJS

Without Their Permission: How the 21st Century Will Be Made, Not Managed


Alexis Ohanian - 2013
    And when that power is harnessed to create new communities, technologies, businesses or charities, the results can be absolutely stunning. In this book, Alexis will share his ideas, tips and even his own doodles about harnessing the power of the web for good, and along the way, he will share his philosophy with young entrepreneurs all over the globe. At 29, Ohanian has come to personify the dorm-room tech entrepreneur, changing the world without asking permission. Within a couple of years of graduating from the University of Virginia, Ohanian did just that, selling reddit for millions of dollars. He's gone on to start many other companies, like hipmunk and breadpig, all while representing Y Combinator and investing in over sixty other tech startups. Without Their Permission is his personal guidebook as to how other aspiring entrepreneurs can follow in his footsteps.