Book picks similar to
Unix Internals by Steve Pate


unix
softwareeng
ashleys-library
young-adult-educational-material

And the Waters Turned to Blood


Rodney Barker - 1997
    In the coastal waters of North Carolina—and now extending as far north as the Chesapeake Bay area—a mysterious and deadly aquatic organism named Pfiesteria piscicida threatens to unleash an environmental nightmare and human tragedy of catastrophic proportions. At the very center of this narrative is the heroic effort of Dr. JoAnn Burkholder and her colleagues, embattled and dedicated scientists confronting medical, political, and corporate powers to understand and conquer this new scourge before it claims more victims.

Accidental Empires


Robert X. Cringely - 1992
    Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.

A Life Worth Living


Lady Colin Campbell - 1997
    She enjoyed privileges, but her teenage years were blighted, leaving her unable to receive essential medical treatment until she was 21. She became a model and a designer, and in the 1970s embarked on a short and violent marriage to Lord Colin Campbell. In this autobiography she writes of a life-long struggle to be accepted as the woman she is. She tells of her formative years in Jamaica and New York, her many love affairs, her connection with members of the Royal Family, her activities as a socialite and international charity organizer, and her current life as the fulfilled mother of two adopted Russian children.

Pro C# 3.0 and the .NET 3.5 Framework (Pro)


Andrew Troelsen - 2007
    Since that time, this text has been revised, tweaked, and enhanced to account for the changes found within each release of the .NET platform (1.1, 2.0, 3.0 and now 3.5)..NET 3.0 was more of an augmentative release, essentially providing three new APIs: Windows Presentation Foundation (WPF), Windows Communication Foundation (WCF) and Windows Workflow Foundation (WF). As you would expect, coverage of the "W's" has been expanded a great deal in this version of the book from the previous Special Edition text.Unlike .NET 3.0, .NET 3.5 provides dozens of C# language features and .NET APIs. This edition of the book will walk you through all of this material using the same readable approach as was found in previous editions. Rest assured, you'll find detailed coverage of Language Integrated Query (LINQ), the C# 2008 language changes (automatic properties, extension methods, anonymous types, etc.) and the numerous bells and whistles of Visual Studio 2008. What you'll learn Everything you need to knowget up to speed with C# 2008 quickly and efficiently. Discover all the new .NET 3.5 featuresLanguage Integrated Query, anonymous types, extension methods, automatic properties, and more. Get a professional footholdtargeted to appeal to experienced software professionals, this book gives you the facts you need the way you need to see them. A rock-solid foundationfocuses on everything you need to be a successful .NET 3.5 programmer, not just the new features. Get comfortable with all the core aspects of the platform including assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, and much more. Who this book is forIf you're checking out this book for the first time, understand that it targets experienced software professionals and/or students of computer science (so please don't expect three chapters devoted to "for" loops). The mission of this text is to provide you with a rock-solid foundation to the C# 2008 programming language and the core aspects of the .NET platform (object-oriented programming, assemblies, file IO, Windows Forms/WPF, ASP.NET, ADO.NET, WCF, WF, etc.). Once you digest the information presented in these 33 chapters, you'll be in a perfect position to apply this knowledge to your specific programming assignments, and you'll be well equipped to explore the .NET universe on your own terms. "

Beginning Programming with Java for Dummies


Barry Burd - 2003
    Covering everything from basic Java development concepts to the latest tools and techniques used in Java, this book will put would-be programmers on their way to Java mastery Explores what goes into creating a program, how to put the pieces together, dealing with standard programming challenges, debugging, and making it work Updated for the release of the Java SDK 2.0, with all examples revised to reflect the changes in the technology

Blue Sparrow: Tweets on Writing, Reading, and Other Creative Nonsense


Ksenia Anske - 2013
    It's a compilation of my daily ramblings as a first time novelist encouraging myself and others to bite the bullet and do it despite the fear of the blank paper, the insecurities, and the angst every writer faces when trying to bleed the story out. My Twitter followers asked me to make this book. They said they want to carry it around in their pockets and take it out each time they feel stuck, scared, or simply need to smile. They tell me my tweets are encouraging and funny. You be the judge.

John the Baptist


F.B. Meyer - 2012
    But I am more thankful for the hours of absorbing interest spent in the study of his portraiture as given in the Gospels. I know of nothing that makes so pleasant a respite from the pressure of life's fret and strain, as to bathe mind and spirit in the translucent waters of Scripture biography. As the clasp between the Old Testament and the New - the close of the one and the beginning of the other; as among the greatest of those born of women; as the porter who opened the door to the True Shepherd; as the fearless rebuker of royal and shameless sin - the Baptist must ever compel the homage and admiration of mankind. In many respects, such a life cannot be repeated. But the spirit of humility and courage; of devotion to God, and uncompromising loyalty to truth, which was so conspicuous in him, may animate us. We, also, may be filled with the spirit and power of Elijah, as he was; and may point, with lip and life, to the Saviour of the world, crying, "Behold the Lamb of God."

The Road Ahead


Bill Gates - 1995
    Includes a compact disc which is playable on CD-ROM and audio CD players.

A Habit of Resistance


Fernando A. Torres - 2015
    Sister Marie's latest novitiate is a young woman named Noele whose fiancé, René, fled to Paris only to find it overrun by the Nazis. Now back in sleepy Brassac, both René and Noele realize that decisions of love and liberation can never, truly, be avoided. Sister Marie is not unsympathetic to the emotions with which Noele battles; having gone through a similar struggle when she was young. The offbeat nuns must wrestle with how far to expand the margins of their vows, in hopes of saving their town and themselves. A Habit of Resistance is a humorous, but thought-provoking story of personal denial and redemption.

Surgical Speed Shooting: How to Achieve High-Speed Marksmanship in a Gunfight


Andy Stanford - 2001
    These cutting-edge techniques for managing recoil in rapid fire, high-speed trigger control and more are used by today's hostage rescue teams and competitive grandmasters.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Apauk, Caller of Buffalo


James Willard Schultz - 1916
    An Indian boy by adoption, J. W. Schultz has told his paleface brothers many good Indian tales. "Apauk, Caller of Buffalo", was a lad in the land and the days of the great buffalo herds. Apauk. a Blackfoot boy. was taught when young the art of calling buffalo. A new type of the wooly, wild west Indian story appears in "Apauk, Caller of Buffalo." More thrilling than Action, the life story of the greatest of the Blackfeet medicine men, not only possesses an enthralling interest but gives the reader an authoritative historical picture of the life of the American Indian on the great western plains before the invasion of the white man. The biographer, James Wlllard Schultz, is an adopted member of the Blackfeet tribe and has lived the life of an Indian for forty years. Schultz writes: "ALTHOUGH I had known Apauk A—Flint Knife—for some time, it was not until the winter of 1879—80 that I became intimately acquainted with him. He was at that time the oldest member of the Piegan tribe of the Blackfeet Confederacy, and certainly looked it, for his once tall and powerful figure was shrunken and bent, and his skin had the appearance of wrinkled brown parchment. "In the fall of 1879, the late Joseph Kipp built a trading-post at the junction of the Judith River and Warm Spring Creek, near where the town of Lewistown, Montana, now stands, and as usual I passed the winter there with him. We had with us all the bands of the Piegans, and some of the bands of the Blood tribe, from Canada. The country was swarming with game, buffalo, elk, antelope, and deer, and the people hunted and were care-free and happy, as they had ever been up to that time. Camped beside our trading-post was old Hugh Monroe, or Rising Wolf, who had joined the Piegans in 1816, and it was through him that I came to know Apauk well enough to get the story of his remarkably adventurous and romantic youth. The two old men were great chums. Old as they were —Monroe was born in 1798, and Apauk was several years his senior—on pleasant days they mounted their horses and went hunting, and seldom failed to bring in game of some kind. And what a picturesque pair they were ! Both wore capotes ——hooded coats made from three-point Hudson Bay Company blankets—and leggins to match, and each carried an ancient Hudson Bay fuke, or flint-lock gun. They would have nothing to do with cap rifles, or the rim-fire cartridge, repeating weapons of modern make. Hundreds—yes, thousands of head of various game, many a savage grizzly, and a score or two of the enemy—— Sioux, Cree, Crow, Cheyenne, and Assiniboine, had they killed with the sputtering pieces, and they were their most cherished possessions. "Oh, that I could live over again those buffalo days! Those Winter evenings in Monroe’s or Apauk’s lodge, listening to their tales of the long ago! Nor was I the only interested listener: always there was a complete circle of guests around the cheerful fire; old men, to whom the tales brought memories of their own eventful days, and young men, who heard with intense interest of the adventures of their grandfathers, and of the “ calling of the buffalo,” which strange and wonderful method of obtaining at one swoop a whole tribe’s store of Winter food, they were never to witness. For the luring of whole herds of buffalo to their death had been Apauk’s sacred, honored, and danger-fraught avocation.

Trail Food: Drying and Cooking Food for Backpacking and Paddling


Alan S. Kesselheim - 1998
    . . a book that will appeal to everyone who has ever choked down the pre-packaged, bargain-basement camp food (or gone bankrupt buying the good stuff). --Canoe & Kayak. . . if you're on the lookout for a way to bring real meals to the field, [this book] might have the answer. --Field & StreamLife in the outdoors revolves around food--cooking it, eating it, packing it, carrying it. We even fantasize about it, especially after a week of eating store-bought provisions. This book is all about fulfulling those food fantasies and avoiding those expensive disappointments. Trail Food tells you how to remove water from food, to make it lighter and longer-lasting, without removing its taste. Learn to plan menus and prepare meals just like the ones you left behind, using fresh foods from your garden or market, prepared and seasoned the way you like them.Why fantasize when you can have the real thing?

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)


Marianne Bellotti - 2021
    Aging computer systems present complex technical challenges for organizations both large and small, and Kill It with Fire provides sound strategies for spearheading modernization efforts.Kill It with Fire examines aging computer systems, the evolution of technology over time, and how organizations can modernize, maintain, and future-proof their current systems.In playful and engaging prose, Marianne Bellotti uses real-world case studies to illustrate the technical challenges of modernizing complex legacy systems, as well as the organizational challenges of time-intensive maintenance efforts. The book explains how to evaluate existing architecture, create upgrade plans, and handle communication structures. Team exercises and historical analyses of complex computer systems make this a valuable resource for those in both older and newer companies, and will help readers restore or create systems built to evolve as time goes on.