Book picks similar to
TLS Mastery: Tux edition by Michael W. Lucas
tech-shelf
waiting
computers-software
software
Day Zero
Derek Slaton - 2018
It’s highly infectious, incredibly lethal, and turns the recently deceased into fast moving zombies with a taste for human flesh. Rookie officer Lacy Sparks is thrust into the action when she is assigned to a federal strike force tasked with preventing the outbreak from becoming a full blown pandemic. It’s a race against the clock as she and her team struggles to survive against the growing forces of the undead.
Pluto's Ghost
B.C. Chase - 2017
It contained a "golden record" with sounds, pictures, and greetings from earth.On March 15th, 2013, NASA received a transmission from the spacecraft that said: "Hello. We received your golden record. Let's meet." On September 29th, internationally bestselling author B.C.CHASE invites you on a daring first contact mission into deep space with five intrepid astronauts, one spunky cosmonaut, and a seventy-five-year-old truck driver.
MySQL Cookbook
Paul DuBois - 2002
Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers of all levels who don't have the time (or expertise) to solve MySQL problems from scratch.The new edition covers MySQL 5.0 and its powerful new features, as well as the older but still widespread MySQL 4.1. One major emphasis of this book is how to use SQL to formulate queries for particular kinds of questions, using the mysql client program included in MySQL distributions. The other major emphasis is how to write programs that interact with the MySQL server through an API. You'll find plenty of examples using several language APIs in multiple scenarios and situations, including the use of Ruby to retrieve and format data. There are also many new examples for using Perl, PHP, Python, and Java as well.Other recipes in the book teach you to:Access data from multiple tables at the same time Use SQL to select, sort, and summarize rows Find matches or mismatches between rows in two tables Determine intervals between dates or times, including age calculations Store images into MySQL and retrieve them for display in web pages Get LOAD DATA to read your data files properly or find which values in the file are invalid Use strict mode to prevent entry of bad data into your database Copy a table or a database to another server Generate sequence numbers to use as unique row identifiers Create database events that execute according to a schedule And a lot moreMySQL Cookbook doesn't attempt to develop full-fledged, complex applications. Instead, it's intended to assist you in developing applications yourself by helping you get past problems that have you stumped.
XML in a Nutshell
Elliotte Rusty Harold - 2001
But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.
The Good Priest's Son
Reynolds Price - 2005
Unable to resume his normal life, he flies south to North Carolina to visit his aged father, a widowed Episcopal priest who is cared for by live-in nurse Audrey Thornton and her grown son, Marcus. During his stay -- with help from his cantankerous father, Audrey, Marcus, and an alluring old flame named Gwyn -- Mabry is compelled to explore his tormented relationship with his father and a world he fondly remembers but has long since abandoned. Back in New York a week later, Mabry faces his old life, which lies in ruins before his eyes. There, he must once again confront change and uncertainty -- and a daunting disease that may prove fatal. In an elegantly crafted and profoundly moving novel, Reynolds Price follows one man's wrenching journey to come to terms with two familiar worlds that have been radically altered.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Essential System Administration: Tools and Techniques for Linux and Unix Administration
Æleen Frisch - 2002
Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
The Steel Hounds
Vladimir Vasilenko - 2019
While the political landscape for this new world is yet to form, intrigues, conspiracy, daring raids, and sabotage are the main weapons of the Hounds, and his evaluation has just begun. To complete it successfully and become a full-fledged member of the clan, Stan will have to adapt to working side-by-side with the most unique people with shady backgrounds — even if he is not a team player by nature and has already failed at the very beginning by choosing the least suitable class for teamwork: Battle Monk. Stan is rebellious, free-spirited, and daring. He risks his life every day just to avoid getting bored of the daily grind. Normally, an expelled student has no hope of entering the virtual world of Artar, an expensive online VR project, but when a suspicious organization offers to pay all expenses to let Stan in for a special purpose, Mongoose gets his chance to become one of the select few. However, to successfully complete his trial, Stan will have to face his main enemy — himself, while finding peace and mastering all five styles of the Battle Monks of Artar. *** The Steel Hounds is the first book of the highly popular Russian LitRPG series The Chronicles of Artar by Vladimir Vasilenko. The brightest representative of a new wave of gamelit writers, Vladimir has created the story of Mongoose, a reckless teenager kicked out of college, who has to struggle with following strict discipline and finding inner harmony while traversing the difficult path of a Battle Monk.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
Programming Game AI by Example
Mat Buckland - 2004
Techniques covered include state- and goal-based behavior, inter-agent communication, individual and group steering behaviors, team AI, graph theory, search, path planning and optimization, triggers, scripting, scripted finite state machines, perceptual modeling, goal evaluation, goal arbitration, and fuzzy logic.
Test Driven Development for Embedded C
James W. Grenning - 2010
You thought TDD was for someone else, but it's not! It's for you, the embedded C programmer. TDD helps you prevent defects and build software with a long useful life. This is the first book to teach the hows and whys of TDD for C programmers. TDD is a modern programming practice C developers need to know. It's a different way to program---unit tests are written in a tight feedback loop with the production code, assuring your code does what you think. You get valuable feedback every few minutes. You find mistakes before they become bugs. You get early warning of design problems. You get immediate notification of side effect defects. You get to spend more time adding valuable features to your product. James is one of the few experts in applying TDD to embedded C. With his 1.5 decades of training, coaching, and practicing TDD in C, C++, Java, and C# he will lead you from being a novice in TDD to using the techniques that few have mastered. This book is full of code written for embedded C programmers. You don't just see the end product, you see code and tests evolve. James leads you through the thought process and decisions made each step of the way. You'll learn techniques for test-driving code right next to the hardware, and you'll learn design principles and how to apply them to C to keep your code clean and flexible. To run the examples in this book, you will need a C/C++ development environment on your machine, and the GNU GCC tool chain or Microsoft Visual Studio for C++ (some project conversion may be needed).
JavaScript Pocket Reference
David Flanagan - 1998
You can use JavaScript to create dynamic, interactive applications that run completely within a web browser. JavaScript is also the language of choice for developing Dynamic HTML content. Because its syntax is based on the popular programming languages C, C++, and Java, JavaScript is familiar and easy to learn for experienced programmers. At the same time, it's an interpreted scripting language, providing a flexible, forgiving programming environment for new programmers. The JavaScript Pocket Reference, 2nd Edition, provides a complete overview of the core JavaScript language and client-side scripting environment, as well as quick-reference material on core and client-side objects, methods, and properties. The new edition has been revised to cover JavaScript 1.5, and is particularly useful for developers working with the standards-compliant web browsers, such as Internet Explorer 6, Netscape 7, and Mozilla. Ideal as an introduction for beginners and a quick reference for advanced developers, this pocket-sized book is easy to take anywhere and serves as the perfect companion volume to the bestselling JavaScript: The Definitive Guide, 4th Edition. O'Reilly's Pocket References have become a favorite among developers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point and need to get to the answer quickly, the new JavaScript Pocket Reference is the book you'll want close at hand.
Dynamic HTML: The Definitive Reference: The Definitive Reference
Danny Goodman - 1998
You need to stay current on the relevant Web specifications, like HTML, CSS, DOM, and ECMAScript. You also need to know how the latest Web browsers from Netscape and Microsoft actually implement these standards, since browser implementations of the standards are less than perfect. Right now, you're forced to keep multiple reference books open on your desk (or multiple browser windows open on your screen), just to develop a simple dynamic Web page that works properly under both Navigator and Internet Explorer.Dynamic HTML: The Definitive Reference changes all that. This book is an indispensable compendium for Web content developers. It contains everything you need to create functional cross-platform Web applications, including:A complete reference for all of the HTML tags, CSS style attributes, browser document objects, and JavaScript objects supported by the various standards and the latest versions of Navigator and Internet Explorer. Browser compatibility is emphasized throughout; the reference pages clearly indicate browser support for every entity. Handy cross-reference indexes that make it easy to find interrelated HTML tags, style attributes, and document objects. An advanced introduction to creating dynamic Web content that addresses the cross-platform compromises inherent in Web page design today. If you have some experience with basic Web page creation, but are new to the world of dynamic content, Dynamic HTML: The Definitive Reference will jump-start your development efforts. If you are an experienced Web programmer, you'll find the browser-compatibility information invaluable. This book is the only DHTML reference that a Web developer needs.Dynamic HTML: The Definitive Reference is designed to work in conjunction with HTML: The Definitive Guide and JavaScript: The Definitive Guide. HTML: The Definitive Guide teaches you about every element of HTML in detail, with explanations of how each element works and how it interacts with other elements, as well as numerous examples. JavaScript: The Definitive Guide provides a thorough description of the JavaScript language, complete with sophisticated examples that show you how to handle common Web application tasks. Together, these three books provide a complete library for Web content developers.
NSHipster: Obscure Topics in Cocoa & Objective C
Mattt Thompson - 2013
In cultivating a deep understanding and appreciation of Objective-C, its frameworks and ecosystem, one is able to create apps that delight and inspire users. Combining articles from NSHipster.com with new essays, this book is the essential guide for modern iOS and Mac OS X developers.
The Demon Cycle Books 1-3 and Novellas: The Painted Man, The Desert Spear, The Daylight War plus The Great Bazaar and Brayan’s Gold and Messenger’s Legacy
Peter V. Brett - 2015
Brett.Eleven-year-old Arlen lives with his parents on their small farmstead, half a day's ride from the isolated hamlet of Tibbet's Brook.As dusk falls upon Arlen's world hungry corelings – demons that cannot be harmed by mortal weapons – materialize from the vapours to feed on the living.When Arlen's life is shattered by the demon plague, he is forced to see that it is fear, rather than the demons, which truly cripples humanity. Believing that there is more to his world than to live in constant fear, he must risk leaving the safety of his wards to discover a different path.In the small town of Cutter's Hollow, Leesha's perfect future is destroyed by betrayal and a simple lie. Publicly shamed, she is reduced to gathering herbs and tending an old woman more fearsome than the corelings. Yet in her disgrace, she becomes the guardian of dangerous ancient knowledge.Orphaned and crippled in a demon attack, young Rojer takes solace in mastering the musical arts of a Jongleur, only to learn that his unique talent gives him unexpected power over the night.Together, these three young people will offer humanity a last, fleeting chance of survival.This bundle collects the first three novels of The Demon Cycle, THE PAINTED MAN, THE DESERT SPEAR and THE DAYLIGHT WAR, along with the novellas THE GREAT BAZAAR AND BRAYAN’S GOLD and MESSENGER’S LEGACY.