Between You & Me: Confessions of a Comma Queen


Mary Norris - 2015
    Now she brings her vast experience, good cheer, and finely sharpened pencils to help the rest of us in a boisterous language book as full of life as it is of practical advice.Between You & Me features Norris's laugh-out-loud descriptions of some of the most common and vexing problems in spelling, punctuation, and usage—comma faults, danglers, "who" vs. "whom," "that" vs. "which," compound words, gender-neutral language—and her clear explanations of how to handle them. Down-to-earth and always open-minded, she draws on examples from Charles Dickens, Emily Dickinson, Henry James, and the Lord's Prayer, as well as from The Honeymooners, The Simpsons, David Foster Wallace, and Gillian Flynn. She takes us to see a copy of Noah Webster's groundbreaking Blue-Back Speller, on a quest to find out who put the hyphen in Moby-Dick, on a pilgrimage to the world's only pencil-sharpener museum, and inside the hallowed halls of The New Yorker and her work with such celebrated writers as Pauline Kael, Philip Roth, and George Saunders.Readers—and writers—will find in Norris neither a scold nor a softie but a wise and witty new friend in love with language and alive to the glories of its use in America, even in the age of autocorrect and spell-check. As Norris writes, "The dictionary is a wonderful thing, but you can't let it push you around."

Language Files: Materials for an Introduction to Language and Linguistics


Ohio State University - 1994
    The introduction file provides an overview of the subfield of linguistics to be studied, as well as the specific topics to be discussed. To make the book more interesting and to help students better understand the content, this new edition is enriched with visual illustrations such as cartoons, drawings, real life pictures, and schematic representation of examples, in addition to the figures and charts in the past editions. New exercises and suggested further readings are added in many chapters. Answers to the exercises are available at the back of the book and on-line for teachers and students.

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.

The Delicate Art of Bureaucracy: Digital Transformation with the Monkey, the Razor, and the Sumo Wrestler


Mark Schwartz - 2020
    Through humor, a healthy dose of history and philosophy, and real-life examples from his days as a government bureaucrat, Schwartz shows IT leaders (and the whole of business) how to master the arts of the Monkey, the Razor, and the Sumo Wrestler to create a lean, learning, and enabling bureaucracy. For anyone frustrated by roadblocks, irritated you can't move fast enough, suffering under the weight of crushing procedures, this book is for you. No matter your role, you need a playbook for bureaucracy. This is it. With this playbook, you can wield bureaucracy as a superpower and bust through it at the same time.

Absolute Freebsd: The Complete Guide to Freebsd


Michael W. Lucas - 2007
    But it can be even trickier to use than either Unix or Linux, and harder still to master.Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for both servers and clients Monitor your system with performance-testing and troubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network management system. Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.

The Node Beginner Book


Manuel Kiessling - 2011
    The aim of The Node Beginner Book is to get you started with developing applications for Node.js, teaching you everything you need to know about advanced JavaScript along the way on 59 pages.

Systems Analysis and Design


Elias M. Awad - 1985
    

Fruit Of A Poisoned Tree: A True Story Of Murder And The Miscarriage Of Justice


Antony Altbeker - 2011
    The trial itself was sensational enough to attract the attention of the world’s largest association of professional forensic investigators. At the start, everyone expected a ‘guilty’ verdict. His fingerprints were at the scene, the murder weapon was in his car and a blood stain in the bathroom was matched to one of his shoes. And yet, he was acquitted and is now suing the Minister of Police, saying that the evidence was fabricated. Altbeker witnessed the trial, and looks closely at how the justice system failed both van der Vyver and Lotz.

Oxford Word Skills Intermediate


Ruth Gairns - 2008
    Short, clear presentations and lots of opportunity for practice give students the confidence to use new vocabulary. 80 units at each level mean they cover a huge range of topics and everyday situations. Extra practice and interactive activities on CD-ROM.

Women, Fire, and Dangerous Things: What Categories Reveal About the Mind


George Lakoff - 1987
    In addition, it should have repercussions in a variety of disciplines, ranging from anthropology and psychology to epistemology and the philosophy of science. . . . Lakoff asks: What do categories of language and thought reveal about the human mind? Offering both general theory and minute details, Lakoff shows that categories reveal a great deal."—David E. Leary, American Scientist

MongoDB Applied Design Patterns


Rick Copeland - 2013
    You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process.Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including:Operational intelligence: Perform real-time analytics of business dataEcommerce: Use MongoDB as a product catalog master or inventory management systemContent management: Learn methods for storing content nodes, binary assets, and discussionsOnline advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and biddingSocial networking: Learn how to store a complex social graph, modeled after Google+Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game

Bayes' Rule: A Tutorial Introduction to Bayesian Analysis


James V. Stone - 2013
    Discovered by an 18th century mathematician and preacher, Bayes' rule is a cornerstone of modern probability theory. In this richly illustrated book, intuitive visual representations of real-world examples are used to show how Bayes' rule is actually a form of commonsense reasoning. The tutorial style of writing, combined with a comprehensive glossary, makes this an ideal primer for novices who wish to gain an intuitive understanding of Bayesian analysis. As an aid to understanding, online computer code (in MatLab, Python and R) reproduces key numerical results and diagrams.Stone's book is renowned for its visually engaging style of presentation, which stems from teaching Bayes' rule to psychology students for over 10 years as a university lecturer.

Total Workday Control Using Microsoft Outlook


Michael Linenberger - 2005
    Outlook 2007 and 2003 are also covered. This seminal guide presents the author's best practices of time, task, and e-mail management, drawing from time management theories and applying these best practices in Microsoft Outlook. Anyone who finds they are overburdened by e-mail or working too late each day will benefit from this book.

Exam Ref 70-480: Programming in HTML5 with JavaScript and CSS3


Rick Delorme - 2013
    Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Implement and manipulate document structures and objectsImplement program flowAccess and secure dataUse CSS3 in applicationsThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)

Data Analysis Using SQL and Excel


Gordon S. Linoff - 2007
    This book helps you use SQL and Excel to extract business information from relational databases and use that data to define business dimensions, store transactions about customers, produce results, and more. Each chapter explains when and why to perform a particular type of business analysis in order to obtain useful results, how to design and perform the analysis using SQL and Excel, and what the results should look like.