IPv6 Essentials


Silvia Hagen - 2002
    It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.Beginning with a short history of IPv6, author Silvia Hagen provides an overview of new functionality and discusses why we need IPv6. Hagen also shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address and ICMPv6 message format, Security, QoS, Mobility and, last but not least, offers a Quick Start Guide for different operating systems. IPv6 Essentials, Second Edition also covers:In-depth technical guide to IPv6 Mechanisms and Case Studies that show how to integrate IPv6 into your network without interruption of IPv4 services Routing protocols and upper layer protocols Security in IPv6: concepts and requirements. Includes the IPSEC framework and security elements available for authentication and encryption Quality of Service: covers the elements available for QoS in IPv6 and how they can be implemented Detailed discussion of DHCPv6 and Mobile IPv6 Discussion of migration cost and business case Getting started on different operating systems: Sun Solaris, Linux, BSD, Windows XP, and Cisco routersWhether you're ready to start implementing IPv6 today or are planning your strategy for the future, IPv6 Essentials, Second Edition will provide the solid foundation you need to get started."Silvia's look at IPv6 is always refreshing as she translates complex technology features into business drivers and genuine end-user benefits to enable building new business concepts based on end to end models." Latif Ladid, President IPv6 Forum, Chair EU IPv6 Task Force

The 1500-Calorie-A-Day Cookbook


Nancy S. Hughes - 2008
    Slim down. It's just that easy--with just 1,500 delicious calories a day!From the author of The 1,200-Calorie-a-Day Menu Cookbook, comes all new recipes for when you are counting calories but don't want to sacrifice flavor, taste, or variety. While most low-calorie meal plans leave you hungry for more, this cookbook serves up a satisfying selection of energy-boosting breakfasts, fast-fix lunches, and delectable dinners--plus two healthy snacks and one guilt-free dessert--every single day! It's hard to believe it's just 1,500 calories.

Chuck Klosterman on Media and Culture: A Collection of Previously Published Essays


Chuck Klosterman - 2010
    From Sex, Drugs, and Cocoa Puffs; Chuck Klosterman IV; and Eating the Dinosaur, these essays are now available in this ebook collection for fans of Klosterman’s writing on media and culture.

Linux Server Hacks: 100 Industrial-Strength Tips and Tools


Rob Flickenger - 2003
    Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks.Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.

sed & awk


Dale Dougherty - 1990
    The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).

The Dumpling: A Seasonal Guide


Wai Hon Chu - 2009
    Wai Hon Chu—who has worked in the in the kitchens of March, Clementine, and The Russian Tea Room, and is creator of El Eden Chocolates, named Best Gourmet Chocolate by New York Press—and Connie Lovett take dumpling aficionados on a culinary tour around the globe, offering more than 100 mouthwatering recipes that cover the full range of dumpling possibilities.

The California Roll


John Vorhaus - 2010
    What do the Merlin Game, the Penny Skim, the Doolally Snadoodle, and the Afterparty Snuke have in common? They’re all the work of world-class con artist and master bafflegabber Radar Hoverlander. Radar’s been “on the snuke” since childhood, but he’s still looking for his California Roll, the one big scam that’ll set him up in sushi for life. Trouble arrives in the stunning, sassy package of Allie Quinn, either the last true innocent or a con artist so slick she makes Radar look like a Quaker. Radar’s hapless sidekick, Vic Mirplo, a lovable loser who couldn’t con a kid out of a candy cane, thinks Radar’s being played. But if love is blind, it’s also deaf, dumb and stupid, and before Radar knows it, he’s sucked into a vortex of double-, triple-, quadruple-crosses that’ll either net him his precious California Roll or put him in a hole in the ground.As timeless as a perpetual-motion machine, as timely as a Madoff arraignment, The California Roll brings you deep inside the world of con artistry, where every fact is fiction and the second liar never has a chance.

The Game On! Diet: Kick Your Friend's Butt While Shrinking Your Own


Krista Vernoff - 2009
    It's a bold new approach to fitness that turns the latest, smartest, most successful health science into a fun, fierce, and exhilarating game. Developed by Az Ferguson, to help Grey's Anatomy writer Krista Vernoff shed forty pounds of postpregnancy weight, it is the ideal program for busy people who should be working out but have a thousand good excuses not to.Az keeps you motivated and Krista keeps you laughing as they show you how to organize opposing teams, set goals, and compete to earn points for daily exercise, healthy meal plans, and positive lifestyle changes. With The Game On! Diet, the process of losing weight, for the first time ever, is actually fun. After all, what's better than a bikini body . . . and bragging rights?Get out there and lose . . . to win! Game on!

The Linux Command Line


William E. Shotts Jr. - 2012
    Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction

Mastering the Grill: The Owner's Manual for Outdoor Cooking


Andrew Schloss - 2007
    That's what makes Mastering the Grill a standout on the cookbook shelf. From equipment (grill types and tools) to fire (wood, charcoal, or gas) to ingredients (meat, poultry, fish, and vegetables), the authors have shared their impressive grilling know-how to explain the whys and the howsand guarantee the wowsclearly and comprehensively. In addition to hundreds of tips and techniques, this ultimate guide is packed with how-to illustrations and mouthwatering photographs plus 350 surefire recipeseverything from rubs and marinades to appetizers, entrees, side dishes, and desserts. Mastering the Grill is a master class in cooking, destined to become a sauce-stained, well-thumbed classic.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

Tombstoning


Doug Johnstone - 2006
    What do you do?Well, if you're David Lindsay from Arbroath, you get the hell out of there and don't return. Not for at least fifteen years. Until Nicola Cruickshank - yes, that Nicola, the girl you always fancied but never had the guts to approach - gets in touch and asks - no, demands - that you go back for a school reunion. To the place where it happened. The place you've been running from for fifteen years. Of course you go. Not to belatedly lay your mate to rest, but because you still fancy Nicola.The thing is, if you are David Lindsay, then returning to Arbroath isn't going to lay any ghosts to rest. And when someone else takes a dive off the cliffs - an act the locals have taken to calling 'tombstoning' - while David's there, he has a choice: run away again, or finally find out why people keep dying around him . . .

Introducing Windows 8.1 for It Professionals


Ed Bott - 2013
    It is offered for sale in print format as a convenience.Get a head start evaluating Windows 8.1 - with early technical insights from award-winning journalist and Windows expert Ed Bott. Based on the Windows 8.1 Preview release, this guide introduces new features and capabilities, with scenario-based advice on how Windows 8.1 can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Preview new features and enhancements, including:How features compare to Windows 7 and Windows XP The Windows 8.1 user experience Deployment Security features Internet Explorer 11 Delivering Windows apps Recovery options Networking and remote access Managing mobile devices Virtualization Windows RT 8.1

Countdown: The Liberators


Tom Kratman - 2011
    Old soldier Wes Stauer is dying inside, from sheer lack of purpose.And then comes the knock on the door: "Our leader's son and heir has been kidnapped. We don't know where he is. We need you to get him back for us. The people who have him are numerous, warlike, and well armed. But money is no object."And then old soldiers - sailor and airmen, too - stop fading away and come back into sharp focus.

In the Beginning...Was the Command Line


Neal Stephenson - 1999
    And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.