Book picks similar to
Creating Effective JavaHelp by Kevin Lewis
former
java
ebooks_unread
got-it
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Web Database Applications with PHP and MySQL
Hugh E. Williams - 2002
Anyone with a modest knowledge of HTML and web site management can learn to create dynamic content through the PHP programming language and the MySQL database. This book gives you the background and tools to do the job safely and reliably.Web Database Applications with PHP and MySQL, Second Edition thoroughly reflects the needs of real-world applications. It goes into detail on such practical issues as validating input (do you know what a proper credit card number looks like?), logging in users, and using templates to give your dynamic web pages a standard look.But this book goes even further. It shows how JavaScript and PHP can be used in tandem to make a user's experience faster and more pleasant. It shows the correct way to handle errors in user input so that a site looks professional. It introduces the vast collection of powerful tools available in the PEAR repository and shows how to use some of the most popular tools.Even while it serves as an introduction to new programmers, the book does not omit critical tasks that web sites require. For instance, every site that allows updates must handle the possibility of multiple users accessing data at the same time. This book explains how to solve the problem in detail with locking.Through a sophisticated sample application--Hugh and Dave's Wine Store--all the important techniques of dynamic content are introduced. Good design is emphasized, such as dividing logic from presentation. The book introduces PHP 5 and MySQL 4.1 features, while providing techniques that can be used on older versions of the software that are still in widespread use.This new edition has been redesigned around the rich offerings of PEAR. Several of these, including the Template package and the database-independent query API, are fully integrated into examples and thoroughly described in the text. Topics include:Installation and configuration of Apache, MySQL, and PHP on Unix®, Windows®, and Mac OS® X systems Introductions to PHP, SQL, and MySQL administration Session management, including the use of a custom database for improved efficiency User input validation, security, and authentication The PEAR repository, plus details on the use of PEAR DB and Template classes Production of PDF reports
R Packages
Hadley Wickham - 2015
This practical book shows you how to bundle reusable R functions, sample data, and documentation together by applying author Hadley Wickham’s package development philosophy. In the process, you’ll work with devtools, roxygen, and testthat, a set of R packages that automate common development tasks. Devtools encapsulates best practices that Hadley has learned from years of working with this programming language.
Ideal for developers, data scientists, and programmers with various backgrounds, this book starts you with the basics and shows you how to improve your package writing over time. You’ll learn to focus on what you want your package to do, rather than think about package structure.
Learn about the most useful components of an R package, including vignettes and unit tests
Automate anything you can, taking advantage of the years of development experience embodied in devtools
Get tips on good style, such as organizing functions into files
Streamline your development process with devtools
Learn the best way to submit your package to the Comprehensive R Archive Network (CRAN)
Learn from a well-respected member of the R community who created 30 R packages, including ggplot2, dplyr, and tidyr
Running Linux
Matt Welsh - 1995
This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an enjoyable environment for personal computing, learning system administration and programming skills, and all-around hacking.This book, now in its third edition, has been widely recognized for years in the Linux community as the getting-started book people need. It goes into depth about configuration issues that often trip up users but are glossed over by other books.A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and at a low cost from many vendors. Developed first on the PC, it has been ported to many other architectures and can now support such heavy-duty features as multiprocessing, RAID, and clustering.Software packages on Linux include the Samba file server and Apache Web server; the X Window System (X11R6); TCP/IP networking (including PPP, SSH, and NFS support); popular software tools such as Emacs and TeX; a complete software development environment including C, C++, Java, Perl, Tcl/Tk, and Python; libraries, debuggers, multimedia support, scientific and database applications, and much more. Commercial applications that run on Linux range from end-user tools like word processors and spreadsheets to mission-critical software like the Oracle, Sybase, Informix, and IBM DB/2 database management systems.Running Linux has all the information you need to understand, install, and start using the Linux operating system. This includes a comprehensive installation tutorial, complete information on system maintenance, tools for document development and programming, and guidelines for network, file, printer, and Web site administration.
PHP Pocket Reference
Rasmus Lerdorf - 2000
The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.
Itil for Dummies, 2011 Edition
Peter Farenden - 2012
It breaks down the 5 stages of the service lifecycle into digestible chunks, helping you to ensure that customers receive the best possible IT experience. Whether readers need to identify their customers' needs, design and implement a new IT service, or monitor and improve an existing service, this official guide provides a support framework for IT-related activities and the interactions of IT technical personnel with business customers and users.Understanding how ITIL can help you Getting to grips with ITIL processes and the service lifecycle Implementing ITIL into your day to day work Learn key skills in planning and carrying out design and implementation projects
How To Read A Book A Day: The Ultimate Guide To Quickly Retain And Absorb Information
Thomas Dev Brown - 2015
Instead you'll be able to absorb the most important content and begin applying it immediately after just one day!
Valkyrie: The North American Xb-70: The Usa's Ill-Fated Supersonic Heavy Bomber
Graham M. Simons - 2011
. . [with] new information, photographs and first-hand accounts." --FlypastDuring the 1950s, plans were being drawn at North American Aviation in Southern California for an incredible Mach-3 strategic bomber. The concept was born as a result of General Curtis LeMay's desire for a heavy bomber with the weapon load and range of the subsonic B-52 and a top speed in excess of the supersonic medium bomber, the B-58 Hustler. However, in April 1961, Defense Secretary McNamara stopped the production go-ahead for the B-70 because of rapid cost escalation and the USSR's newfound ability to destroy aircraft at extremely high altitude using either missiles or the new Mig-25 fighter. Nevertheless, in 1963 plans for the production of three high-speed research aircraft were approved and construction proceeded. In September 1964 the first Valkyrie, now re-coded A/V-1, took to the air for the first time and in October went supersonic.This book is the most detailed description of the design, engineering and research that went into this astounding aircraft. It is full of unpublished details, photographs and firsthand accounts from those closely associated with the project. Although never put into full production, this giant six-engined aircraft became famous for its breakthrough technology, and the spectacular images captured on a fatal air-to-air photo shoot when an observing Starfighter collided with Valkyrie A/V-2 which crashed into the Mojave Desert."Well-illustrated with numerous diagrams and black and white photographs, the book provides an interesting insight into one of the so-called 'white elephant' projects of the 1960s." --Jets Monthly
MCTS Self-Paced Training Kit (Exam 70-536): Microsoft® .NET Framework 2.0�Application Development Foundation: Microsoft .NET Framework 2.0--Application Development Foundation
Tony Northrup - 2006
Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and labs. This official Microsoft study guide is designed to help you make the most of your study time.Maximize your performance on the exam by learning to:Use system types, collections, and generics to help manage data Validate input, reformat text, and extract data with regular expressions Develop services, application domains, and multithreaded applications Enhance your application by adding graphics and images Implement code access security, role-based security, and data encryption Work with serialization and reflection techniques Instrument your applications with logging and tracing Interact with legacy code using COM Interop and PInvoke Practice TestsAssess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.Your kit includes:15% exam discount from Microsoft. (Limited time offer). Details inside. Official self-paced study guide. Practice tests with multiple, customizable testing options and a learning plan based on your results. 450 practice and review questions. Case scenarios and lab exercises. Code samples on CD. 90-day evaluation version of Microsoft Visual Studio 2005 Professional Edition. Fully searchable eBook. A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
802.11 Wireless Networks: The Definitive Guide
Matthew S. Gast - 2002
Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Francis Dacosta - 2013
Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry
Case in Point 10: Complete Case Interview Preparation
Marc P. Cosentino - 2018
He takes you inside a typical interview by exploring the various types of case questions, and he shares with you the acclaimed Ivy Case System. It will give you the confidence to answer even the most sophisticated cases. The book includes dozens of strategy cases, with case starts exercises, 21 ways to cut costs -- plus a special section on Federal and nonprofit cases.!
U.S. History, Volume II: 1865-Present
Boundless - 2013
History textbook is a college-level, introductory textbook that covers the exciting subject of U.S. History. Volume II covers 1865 through the present day. Boundless works with subject matter experts to select the best open educational resources available on the web, review the content for quality, and create introductory, college-level textbooks designed to meet the study needs of university students.This textbook covers:Reconstruction: 1865-1877 -- The End of the War, The Aftermath of the War, The Battle over Reconstruction, Reconstruction in the South, The Reconstructed South, The Grant PresidencyThe Gilded Age: 1870-1900 -- The Gilded Age, The Second Industrial Revolution, The Rise of the City, The Rise of Big Business, The Rise of Immigration, Work in Industrial America, The Transformation of the West, Conquest in the West, The Transformation of the South, Politics in the Gilded Age, Urban Reform, Corruption and Reform, The Agrarian and Populist Movements, The Silver SolutionRace, Empire, and Culture in the Gilded Age: 1870-1900 -- Culture in the Gilded Age, Popular Culture, Cheap Amusements, Education, The Rise of Realism, Labor and Domestic Tensions, The Labor Wars, War, Empire, and an Emerging American World PowerThe Progressive Era: 1890-1917 -- The Progressive Era, Labor, Local, and Political Reform, The Politics of Progressivism, Grassroots Progressivism, Progressivism: Theory and Practice, Changing Ideas of Freedom, Roosevelt's Progressivism, Roosevelt's Second Term, From Roosevelt to Taft, Woodrow Wilson and Progressivism, The Limits of ProgressivismWorld War I: 1914-1919 -- The Wilson Administration, American Neutrality, America's Entry into the War, America and WWI, The War at Home, The "American", The Fight for Peace, Diplomacy & Negotiations at the War's End, The Transition to Peace: 1919-21From the New Era to the Great Depression: 1920-1933 -- The New Era, The Roaring Twenties, The Culture of Change, Resistance to Change, Wall Street Crash of 1929, The Great DepressionThe New Deal: 1933-1940 -- Franklin D. Roosevelt and the First New Deal, The New Deal, Critical Interpretations of the New Deal, The Social Cost of the Depression, Toward a Welfare State, Roosevelt's Second Term, Culture in the Thirties, The Second New Deal, The Legacy of the New DealFrom Isolation to World War II: 1930-1943 -- Non-Interventionism, The Beginning of the War, Conflict in Europe, Conflict in the Pacific, America's Early Involvement, Mobilization in the U.S., Social Effects of the War, The War in Germany, The War in the Pacific, The End of WWIIThe Cold War: 1947-1991 -- Origins of the Cold War, The Cold War, Truman and the Fair Deal, The Cold War and KoreaThe Politics and Culture of Abundance: 1943-1960 -- The Politics of Abundance, The Culture of Abundance, The Eisenhower Administration, The Policy of Containment, The Emergence of the Civil Rights MovementThe Sixties: 1960-1969 -- The Election of 1960, The Expansion of the Civil Rights Movement, Counterculture, The John F. Kennedy Administration, The Lyndon B. Johnson AdministrationThe Conservative Turn of America: 1968-1989 -- The Nixon Administration, Watergate, The Ford Administration, The Carter Administration, The Reagan AdministrationThe Challenges of Globalization and the Coming Century: After 1989 -- The George H.W. Bush Administration, America's Emerging Culture, The Clinton Administration, Globalization and the U.S.
High Performance MySQL: Optimization, Backups, Replication, and More
Baron Schwartz - 2008
Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity.High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL's full power. Learn how to design schemas, indexes, queries and advanced MySQL features for maximum performance, and get detailed guidance for tuning your MySQL server, operating system, and hardware to their fullest potential. You'll also learn practical, safe, high-performance ways to scale your applications with replication, load balancing, high availability, and failover. This second edition is completely revised and greatly expanded, with deeper coverage in all areas. Major additions include: Emphasis throughout on both performance and reliability Thorough coverage of storage engines, including in-depth tuning and optimizations for the InnoDB storage engine Effects of new features in MySQL 5.0 and 5.1, including stored procedures, partitioned databases, triggers, and views A detailed discussion on how to build very large, highly scalable systems with MySQL New options for backups and replication Optimization of advanced querying features, such as full-text searches Four new appendices The book also includes chapters on benchmarking, profiling, backups, security, and tools and techniques to help you measure, monitor, and manage your MySQL installations.
HTML Pocket Reference
Jennifer Niederst Robbins - 1999
In this pocket reference, Jennifer Niederst, the author of the best-selling Web Design in a Nutshell, delivers a concise guide to every HTML tag.Each tag entry includes:Detailed information on the tag's attributes Support information on browsers such as Netscape Navigator, Microsoft Internet Explorer, Opera, and WebTV HTML 4.0 support information, including whether the tag is deprecated in the current spec In addition to tag-by-tag descriptions, you'll find useful charts on such topics as:Character entities Decimal-to-hexadecimal conversions Color names Niederst also provides context for the tags, indicating which tags are grouped together and bare-bones examples of how standard web page elements are constructed.This pocket reference is targeted at web designers and web authors and is likely to be the most dog-eared book on every web professional's desk.