Technology in Action: Complete
Alan Evans - 2004
For introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office.A Computer Concepts Text Focused on Today’s Student!Technology in Action engages students by combining a unique teaching approach with rich companion media.
ToGAF 9 Foundation Study Guide: Preparation for the TOGAF 9 Part 1 Examination
Rachel Harrison - 2009
It gives an overview of every learning objective for the TOGAF 9 Foundation Syllabus and in-depth coverage on preparing and taking the TOGAF 9 Part 1 Examination. It is specifically designed to help individuals prepare for certification.This Study Guide is excellent material for:a) Individuals who require a basic understanding of TOGAF 9b) Professionals who are working in roles associated with an architecture project such as those responsible for planning, execution, development, delivery, and operationc) Architects who are looking for a first introduction to TOGAF 9d) Architects who want to achieve Level 2 certification in a stepwise manner and have not previously qualified as TOGAF 8 CertifiedA prior knowledge of enterprise architecture is advantageous but not required. While reading this Study Guide, the reader should also refer to the TOGAF Version 9.1 documentation available online at www.opengroup.org and also available as hard copy from www.vanharen.net and online booksellers
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
James Michael Stewart - 2015
This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
Christopher Negus - 2007
Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.
The Singularity is Near: When Humans Transcend Biology
Ray Kurzweil - 2005
In his classic The Age of Spiritual Machines, he argued that computers would soon rival the full range of human intelligence at its best. Now he examines the next step in this inexorable evolutionary process: the union of human and machine, in which the knowledge and skills embedded in our brains will be combined with the vastly greater capacity, speed, and knowledge-sharing ability of our creations.
Soonish: Ten Emerging Technologies That'll Improve and/or Ruin Everything
Kelly Weinersmith - 2017
By weaving together their own research, interviews with pioneering scientists and Zach's trademark comics, the Weinersmiths investigate why these innovations are needed, how they would work, and what is standing in their way.
Reality is Broken: Why Games Make Us Better and How They Can Change the World
Jane McGonigal - 2010
The average young person in the UK will spend 10,000 hours gaming by the age of twenty-one. What's causing this mass exodus? According to world-renowned game designer Jane McGonigal the answer is simple: videogames are fulfilling genuine human needs. Drawing on positive psychology, cognitive science and sociology, Reality is Broken shows how game designers have hit on core truths about what makes us happy, and utilized these discoveries to astonishing effect in virtual environments. But why, McGonigal asks, should we use the power of games for escapist entertainment alone? In this groundbreaking exploration of the power and future of gaming, she reveals how gamers have become expert problem solvers and collaborators, and shows how we can use the lessons of game design to socially positive ends, be it in our own lives, our communities or our businesses. Written for gamers and non-gamers alike, Reality is Broken sends a clear and provocative message: the future will belong to those who can understand, design and play games.
Amusing Ourselves to Death: Public Discourse in the Age of Show Business
Neil Postman - 1985
In this eloquent, persuasive book, Neil Postman alerts us to the real and present dangers of this state of affairs, and offers compelling suggestions as to how to withstand the media onslaught. Before we hand over politics, education, religion, and journalism to the show business demands of the television age, we must recognize the ways in which the media shape our lives and the ways we can, in turn, shape them to serve out highest goals.
Burpee the Complete Vegetable & Herb Gardener: A Guide to Growing Your Garden Organically
Barbara W. Ellis - 1997
A Backyard-Gardener's Guide to Growing a Bountiful, Great-Tasting Harvest The Complete Vegetable & Herb Gardener features:A full-color encyclopedia of over 100 vegetables and herbs with detailed, expert advice on growing them successfully from planting to harvest Planting and growing techniques that keep maintenance to a minimum Entries on how to grow unusual edibles, such as refreshing mesclun for salads, colorful edible flowers, spicy mustards, and more Descriptions and photos of a host of succulent vegetables, both hybrids and heirlooms, from common to exotic Complete information on improving even the poorest garden soil using safe, organic techniques, plus practical advice on making compost Recommendations on garden tools you need-and those you don't Information on controlling pests and diseases organically, without resorting to poisonous sprays Spectacular full-color photographs of vegetables and herbs, food gardens, and edible landscapes, plus 30 black-and-white line drawings
Database Systems: Design, Implementation, and Management
Peter Rob - 1993
The proven success of database design treatment is sustained and further improved in this revision. The proven Parts organizations streamline the chapter coverage, so it is an ideal choice for your classroom. Each Part opens with a new business vignette, which provides real world examples to engage your students. The new edition includes updates in every chapter as well as added exercises and cases. There are new chapters such as Advanced Modeling Concepts, Database Performance Tuning and Query Optimization, and Database Connectivity and Web Development. In the seventh edition you will find examples of database usage, which highlights eBAY for compelling context. In our new Query Optimization chapter, we cover database performance tuning concepts, index selectivity and SQL coding practices. There is added EERD coverage such as clusters and subtype discriminator attributes. With the authors' strong writing style and outstanding balance of theory and practice, this is just a small sampling of the improvements we have made to the new edition of Database Systems: Design, Implementation, and Management by Peter Rob and Carlos Coronel.
Ghost Fleet: A Novel of the Next World War
P.W. Singer - 2015
The United States, China, and Russia eye each other across a twenty-first century version of the Cold War, which suddenly heats up at sea, on land, in the air, in outer space, and in cyberspace. The fighting involves everything from stealthy robotic–drone strikes to old warships from the navy’s “ghost fleet.” Fighter pilots unleash a Pearl Harbor–style attack; American veterans become low-tech insurgents; teenage hackers battle in digital playgrounds; Silicon Valley billionaires mobilize for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on blending the lessons of the past with the weapons of the future.Ghost Fleet is a page-turning speculative thriller in the spirit of The Hunt for Red October. The debut novel by two leading experts on the cutting edge of national security, it is unique in that every trend and technology featured in the novel — no matter how sci-fi it may seem — is real, or could be soon.
My Kindle Fire (My...)
Jim Cheshire - 2011
With this book you will learn how to tap into every Kindle Fire feature, including many of the hidden ones not discussed in other books. From setting up your Kindle Page, managing your music, watching movies, and downloading content - this book covers everything. The task based full-color format allows you to quickly and easily find the exact task you want to accomplish and walks you through it in a delightfully concise and visual manner. My Kindle Fire makes it easy for you to:• Master all the basics, fast: reading, playing, watching, browsing, and more• Tweak your Kindle Fire for quicker access and longer battery life• Sample best-seller book chapters for free• Mark up any eBook with highlights, notes, and bookmarks• Convert your personal documents for use on Kindle Fire• Discover Calibre, a powerful eBook management tool• Control even the largest music libraries• Get instant answers from Wikipedia, and from Kindle Fire’s built-in dictionary• Listen to personalized Internet radio stations created just for you• Use your Kindle Fire as a digital photo frame• Prevent unwanted subscription charges• Set up any email account to work on your Kindle Fire• Explore any web content with Amazon’s innovative Silk browser• Use Amazon Cloud to get your stuff anywhere—even if you left your Kindle at home• And much much more…Unlike many other guides which might only briefly mention or skip over some very import Kindle Fire features My Kindle Fire covers everything. Here are just a few of the things you'll find in My Kindle Fire that aren't covered in other guides: • Full coverage of Calibre, a free application for Mac or PC that helps manage your eBook library• A large number of walkthroughs for managing music playlists, including how to use cloud playlists. • How to reinstall multiple apps at once in case you reset your Kindle Fire. • Step-by-step walkthroughs on configuring all types of email accounts. • Coverage on handling attachments in your email application. • Importing contacts from your existing email application or cloud service and how you can export your contacts in order to back them up. • How to use Copy and Paste on the Kindle Fire. • How to use social networking integration with Facebook and others. • Walkthroughs on using the Gallery app, Pandora, Audible, and other popular apps. • Shows you how to access files on other computers in your house right from your Kindle Fire.
iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
Jean M. Twenge - 2017
Born in the mid-1990s to the mid-2000s and later, iGen is the first generation to spend their entire adolescence in the age of the smartphone. With social media and texting replacing other activities, iGen spends less time with their friends in person—perhaps why they are experiencing unprecedented levels of anxiety, depression, and loneliness. But technology is not the only thing that makes iGen distinct from every generation before them; they are also different in how they spend their time, how they behave, and in their attitudes toward religion, sexuality, and politics. They socialize in completely new ways, reject once sacred social taboos, and want different things from their lives and careers. More than previous generations, they are obsessed with safety, focused on tolerance, and have no patience for inequality. iGen is also growing up more slowly than previous generations: eighteen-year-olds look and act like fifteen-year-olds used to. As this new group of young people grows into adulthood, we all need to understand them: Friends and family need to look out for them; businesses must figure out how to recruit them and sell to them; colleges and universities must know how to educate and guide them. And members of iGen also need to understand themselves as they communicate with their elders and explain their views to their older peers. Because where iGen goes, so goes our nation—and the world.
SQL Pocket Guide
Jonathan Gennick - 2003
It's used to create and maintain database objects, place data into those objects, query the data, modify the data, and, finally, delete data that is no longer needed. Databases lie at the heart of many, if not most business applications. Chances are very good that if you're involved with software development, you're using SQL to some degree. And if you're using SQL, you should own a good reference or two.Now available in an updated second edition, our very popular "SQL Pocket Guide" is a major help to programmers, database administrators, and everyone who uses SQL in their day-to-day work. The "SQL Pocket Guide" is a concise reference to frequently used SQL statements and commonly used SQL functions. Not just an endless collection of syntax diagrams, this portable guide addresses the language's complexity head on and leads by example. The information in this edition has been updated to reflect the latest versions of the most commonly used SQL variants including: Oracle Database 10g, Release 2 (includingthe free Oracle Database 10g Express Edition (XE))Microsoft SQL Server 2005MySQL 5IBM DB2 8.2PostreSQL 8.1 database
Email Etiquette: Netiquette in the Information Age
David Tuffley - 2011
While there have been attempts to establish one standard or another as the default, there is no common agreement. So beware people telling you there is one right way, they are assuming too much. As a general rule though, netiquette involves the same principles as plain old etiquette -- basic courtesy, respect and ethics. Treat people the way you would want to be treated yourself. By following the principles outlined below, the recipient of your email will be more likely to read and act, if not be favorably impressed by your message:Subject line to summarise the message. Make the Subject line summarise the body of the e-mail. Ask yourself, 'will the recipient(s) know what this e-mail is about'. For example, Instead of Subject: Exam, say Subject: Location of 1508INT Exam, 23 July 2011.Don't assume the recipient knows the background. Include enough contextual information at the beginning of the e-mail for the recipient to know what the matter is about. If in doubt, put background information in. For example, don't say can I have an extension for my assignment?, instead say I refer to the CIT3622 assignment 1 that I handed in late. I was ill and have a doctor's certificate. May I ask for an extension on the basis that I was too ill to do it on time?Keep it concise. Keep messages brief and to the point, but not so brief that it causes the problem outlined in the previous point. This includes deleting any irrelevant text when an email has been back and forth several times. No-one wants to scroll down through pages of text in order to reach the message they want to read. If the sense of the email will be lost by deleting that text, however, leave it in.Reply within 24 hours. Try to reply within 24 hours, less if possible. In fact, get in the habit of replying immediately -- it is the polite thing to do, and the recipient will appreciate a prompt reply. It also makes you look efficient. The longer you leave it to reply, the more likely you will forget or have too big a log-jam of unanswered email.Allow time for a reply. E-mail messages are not usually required to be answered immediately, though it is good practice if you do. Before sending a reminder, allow some time for a response, some times even a few days. Not everyone is online 24 hours a day.Use the BCC field when sending bulk email. If you're sending email to a whole list of people, put their email addresses in the BCC field. That way, the privacy of the recipient is respected, and spammers cannot harvest the email addresses for their dastardly purposes.