Book picks similar to
The Book of IMAP: Building a Mail Server with Courier and Cyrus by Peer Heinlein
calibre-library
computers
digital
it
Windows Powershell in Action
Bruce Payette - 2007
In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.
DevOps Troubleshooting: Linux Server Best Practices
Kyle Rankin - 2012
It has saved me hours in troubleshooting complicated operations problems." -Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In
DevOps Troubleshooting: Linux Server Best Practices
, award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You'll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps' approach to troubleshooting and proven Linux server problem-solving principles Diagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecks Understand healthy boots, so you can identify failure points and fix them Solve full or corrupt disk issues that prevent disk writes Track down the sources of network problems Troubleshoot DNS, email, and other network services Isolate and diagnose Apache and Nginx Web server failures and slowdowns Solve problems with MySQL and Postgres database servers and queries Identify hardware failures-even notoriously elusive intermittent failures
Backtrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran - 2011
Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Gabriella Coleman - 2014
She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
Expert Oracle Database Architecture: Oracle Database 9i, 10g, and 11g Programming Techniques and Solutions
Thomas Kyte - 2005
Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then you’ll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised second edition covers the latest developments in Oracle Database 11g. Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it. Don’t treat Oracle Database as a black-box. Get this book. Get under the hood. Turbo-charge your career. Fully-revised to cover Oracle Database 11g Proof-by-example approach: Let the evidence be your guide Dives deeply into Oracle Databases’s most powerful features What you’ll learn Develop an evidence-based approach to problem solving Manage transactions in highly concurrent environments Speed access to data through table and index design Manage files and memory structures for performance and reliability Scale up through partitioning and parallel processing Load and unload data to interface with external systems Think for yourself; don’t take Tom’s word for it! Who this book is for This book is aimed at Oracle Database administrators, at PL/SQL and Java developers writing code to be deployed inside the database, and at developers of external applications who use Oracle Database as a data store. It is the go to book for those wishing to create efficient and scalable applications.
The Defenders and Three Others
Philip K. Dick - 1950
Dick! Here are "The Defenders," in which mankind has taken refuge beneath the Earth's surface, leaving all-out war to robots ... "Beyond Lies the Wub," in which a highly philosophical Martian creature finds itself on the wrong end of the dinner table ... "The Crystal Crypt," in which the last Terran ship from Mars finds terrorists aboard ... and "Beyond the Door," a most unusual story in which an abusive husband ends up with more than he bargains for!
Programming C#
Jesse Liberty - 2001
Pursuing that vision, C#'s designers succeeded in creating a safe, simple, component-based, high-performance language that works effectively with Microsoft's .NET Framework. Now the favored language among those programming for the Microsoft platform, C# continues to grow in popularity as more developers discover its strength and flexibility. And, from the start, C# developers have relied on Programming C# both as an introduction to the language and a means of further building their skills. The fourth edition of Programming C#--the top-selling C# book on the market--has been updated to the C# ISO standard as well as changes to Microsoft's implementation of the language. It also provides notes and warnings on C# 1.1 and C# 2.0. Aimed at experienced programmers and web developers, Programming C#, 4th Edition, doesn't waste too much time on the basics. Rather, it focuses on the features and programming patterns unique to the C# language. New C# 2005 features covered in-depth include:Visual Studio 2005GenericsCollection interfaces and iteratorsAnonymous methodsNew ADO.NET data controlsFundamentals of Object-Oriented ProgrammingAuthor Jesse Liberty, an acclaimed web programming expert and entrepreneur, teaches C# in a way that experienced programmers will appreciate by grounding its applications firmly in the context of Microsoft's .NET platform and the development of desktop and Internet applications. Liberty also incorporates reader suggestions from previous editions to help create the most consumer-friendly guide possible.
Advanced Swift
Chris Eidhof - 2016
If you have read the Swift Programming Guide, and want to explore more, this book is for you.Swift is a great language for systems programming, but also lends itself for very high-level programming. We'll explore both high-level topics (for example, programming with generics and protocols), as well as low-level topics (for example, wrapping a C library and string internals).
Jack Noble: Books 1-3
L.T. Ryan - 2015
Ryan has captivated audiences and left them sleepless and breathless since the series debuted in 2012.
"Jason Bourne. Jack Ryan. Jack Bauer. Now Jack Noble. For fans of political intrigue, military mystery and conspiracy Jack Noble is a perfect fit."
Now for a limited time, you can purchase the first three books in the Jack Noble series for over 50% off!NOBLE BEGINNINGS (JACK NOBLE #1) *** OVER 1000 5-STAR REVIEWS ***In March of 2002, while the eyes of the world focused on Afghanistan, Jack Noble finds himself on the outskirts of Baghdad, Iraq. A Marine in name only, Jack is on-loan to the CIA. Normally an integral part of the team, he finds that he is nothing more than a security detail in Iraq.Jack and his partner Bear have a run-in with four CIA special agents over the treatment of an Iraqi family. Within hours Jack and Bear are detained.All Jack wanted was to finish his enlistment and move on with his life. All he did was intervene and save a family from unwarranted violence at the hands of four CIA agents. But he soon discovers that he did far more than intervene. He has placed himself dead square in the middle of a conspiracy that reaches the highest levels of the U.S. government.This Jack Noble political thriller is not for the faint of heart!A DEADLY DISTANCE (JACK NOBLE #2) *** OVER 550 5-STAR REVIEWS ***Washington, D.C. Midday. A man waits at a bus stop, his intentions unknown. Two government operatives have been stalking him for days, waiting for him to make his move. Unexpectedly, the man takes off running and heads for a deserted warehouse.Jack Noble and his partner, Frank Skinner, believe the man to be part of a terrorist organization that is involved in smuggling drugs and guns and men into the country. But it turns out their plan involves far more export than import, and hits a lot closer to home.As the case in this explosive action thriller unfolds, the man behind it all reaches out to Jack with a simple message... 37 hours.THIN LINE (JACK NOBLE #3) *** OVER 275 5-STAR REVIEWS ***Thin Line is Ryan's latest thriller featuring former government assassin Jack Noble as he races from New York to Paris to Washington DC on the trail of a rogue agent marked for termination. When friends can no longer be trusted, and enemies must be, Jack is forced to make a decision that will compromise his integrity, conscience, and his life.These fast-paced thrillers by USA Today bestselling author L.T. Ryan will leave you burning through the pages as Jack Noble races to stop the conspiracy before it claims his life. Fans of Tom Clancy, Lee Child's Jack Reacher, Vince Flynn's Mitch Rapp, and Robert Ludlum's Jason Bourne will enjoy Jack Noble. The Jack Noble Series has been downloaded over 2,000,000 times!
"Move over Jason Bourne there's a new hero in town, Jack Noble is here, period!"
"Having just finished Noble Beginnings and being duly impressed, I feel I can now add L.T.Ryan to my list of favorite authors. Amongst them both Lee Child and Vince Flynn, as Jack Reacher and Mitch Rapp are similar and could certainly hold their own with a newcomer like Jack Noble.
Windows Sysinternals Administrator's Reference
Mark E. Russinovich - 2009
Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns
Exit Strategy: A Lesbian Romance Novel
Nicolette Dane - 2019
But she’s hit a snag. In the midst of a new project that promises to spread her teachings worldwide, Mae and her business are running out of money. Through a bit of serendipity, Mae is connected with one of her idols—wealthy technology goddess Audrey Addison. Audrey worked for the biggest tech giant out there, and now she owns her own angel investment firm. But she’s a serious and severe woman, a keen business mind, and she’s known to be an ice queen despite her fiery red hair. As they grow the company together, Mae sees through Audrey’s stern reputation and discovers the real woman underneath. Can Mae melt Audrey’s heart and succeed both in business and in love?
Tubby Dubonnet Mysteries Vol. 8-9
Tony Dunbar - 2017
But a youthful Tubby chanced to see it happen, and the tragic event's haunted him throughout his life. Decades later, an established (but not exactly driven) lawyer, yet successful enough to have time on his hands, Tubby decides to conduct his own investigation into the forgotten crime. He quickly stirs up a hornets’ nest of far-reaching political feuds, police corruption, government agents, and old men with secrets to hide.But as in all Tubby Dubonnet novels, the plot takes a backseat to local color, colorful characters, odes to fine food, wry observations, and a whole lot of humor. It's a little like spending a weekend in da Big Easy, dawlin'--complete with three well-chosen meals a day!Vol 2 – FAT MAN BLUES – The NINTH installment in Tony Dunbar’s humorous, hard-boiled Tubby Dubonnet mystery seriesEx-con Angelo Spooner is trying to start a legit business, but he just can’t catch a break. Just as his healing Holy Water, “Angelo’s Elixir” is about to go upscale, the sticky strands of the Big Sleazy’s tangled web of crime and corruption reach out to ensnare him. What’s a law-abiding parolee to do? He can’t get caught with a gun, but maybe that axe in his shed could help him extricate himself. But when low-level creep Frenchy Dufour’s henchman turns up nearly beheaded, Angelo’s fate rests in the capable hands of laid-back lawyer Tubby Dubonnet.Tubby’s been trying hard to lay low, too. As those closest to him are targeted by frightening attacks, he suspects his dealings with the clandestine society of Cuban exiles who’ve plagued him lately are far from over. Tubby would love to have nothing further to do with “that crazy band of geriatric lunatics”. But the old Cuban revolutionaries have taught their sons well. Now their grandchildren, heirs to a substantial cache of weapons and money, burn with a dangerous zeal to prove themselves.Meanwhile … a man’s got to eat! The epicurean counselor does his best thinking when he’s well-fed. Our good luck! –as we vicariously sample our way across New Orleans’ culinary panorama on the hunt for an axe murderer. But sleuth does not live by bread alone—even in a Tony Dunbar legal thriller. Ignoring his own advice to his client to “keep your head on your shoulders”, Tubby’s lost his to the lovely Peggy O’Flarity. It’s about time Tubby had some steamy sex – and maybe a little happiness? But fortune teller Sister Soulace has her doubts.
Dogfight: How Apple and Google Went to War and Started a Revolution
Fred Vogelstein - 2013
At the center of this change are Apple and Google, two companies whose philosophies, leaders, and commercial acumen have steamrolled the competition. In the age of the Android and the iPad, these corporations are locked in a feud that will play out not just in the marketplace but in the courts and on screens around the world. Fred Vogelstein has reported on this rivalry for more than a decade and has rare access to its major players. In Dogfight, he takes us into the offices and board rooms where company dogma translates into ruthless business; behind outsize personalities like Steve Jobs, Apple’s now-lionized CEO, and Eric Schmidt, Google’s executive chairman; and inside the deals, lawsuits, and allegations that mold the way we communicate. Apple and Google are poaching each other’s employees. They bid up the price of each other’s acquisitions for spite, and they forge alliances with major players like Facebook and Microsoft in pursuit of market dominance. Dogfight reads like a novel: vivid nonfiction with never-before-heard details. This is more than a story about what devices will replace our phones and laptops. It’s about who will control the content on those devices and where that content will come from—about the future of media in Silicon Valley, New York, and Hollywood.
In the Beginning...Was the Command Line
Neal Stephenson - 1999
And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.