Book picks similar to
Using UNIX by Steve Moritsugu
pete-work
unix
computers
computing-related
Before the Party
W. Somerset Maugham - 1922
    Somerset Maugham’s “Before the Party” is a novelette first published in the December 1922 edition of “Nash’s Magazine.” After the death of her husband, an alcoholic colonial administrator in Borneo, Millicent returns to England to live with her parents and sister. Did Millicent’s husband die of a fever, as Millicent claims, or was his throat cut? And if the latter, was it suicide or homicide?Sample passage:Mrs. Skinner had thought it very peculiar that her daughter should have no photographs of Harold in her room. Indeed she had spoken of it once, but Millicent had made no reply. Millicent had been strangely silent since she came back from Borneo, and had not encouraged the sympathy Mrs. Skinner would have been so willing to show her. She seemed unwilling to speak of her great loss. Sorrow took people in different ways. Her husband had said the best thing was to leave her alone. The thought of him turned her ideas to the party they were going to.About the author:W. Somerset Maugham (1874-1965) was a British novelist, short-story writer, and playwright. Notable novels are “Of Human Bondage,” “The Moon and Sixpence,” and “The Razor’s Edge.”
Recipes from Dorothy Koomson's The Flavours of Love
Dorothy Koomson - 2013
    A free ebook featuring an extract and recipes from the breathtaking new emotional thriller from Dorothy Koomson, The Flavours of Love.
Comptia A+ 220-801 and 220-802 Exam Cram
David L. Prowse - 2012
     Limited Time Offer: Buy CompTIA(R) A+ 220-801 and 220-802 Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code:Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" CompTIA(R) A+ 220-801 and 220-802 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's A+ 220-801 and 220-802 exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 7, new PC hardware, tablets, smartphones, and professional-level networking and security. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last minute review. Covers the critical information you'll need to know to score higher on your CompTIA A+ 220-801 and 220-802 exams!Deploy and administer desktops and notebooks running Windows 7, Vista, or XPUnderstand, install, and troubleshoot motherboards, processors, and memoryTest and troubleshoot power-related problemsUse all forms of storage, including new Blu-ray and Solid State (SSD) devicesWork effectively with mobile devices, including tablets and smartphonesInstall, configure, and troubleshoot both visible and internal laptop componentsConfigure Windows components and applications, use Windows administrative tools, and optimize Windows systemsRepair damaged Windows environments and boot errorsWork with audio and video subsystems, I/O devices, and the newest peripheralsInstall and manage both local and network printersConfigure IPv4 and understand TCP/IP protocols and IPv6 changesInstall and configure SOHO wired/wireless networks and troubleshoot connectivityImplement secure authentication, prevent malware attacks, and protect data Companion CDThe companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Pearson IT Certifcation Practice Test Minimum System RequirementsWindows XP (SP3), WIndows Vista (SP2), or Windows 7Microsoft .NET Framework 4.0 ClientPentium-class 1 GHz processor (or equivalent)512 MB RAM650 MB disk space plus 50 MB for each downloaded practice exam David L. Prowse is an author, computer network specialist, and technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.
The Implementation (TCP/IP Illustrated, Volume 2)
Gary R. Wright - 1995
    "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
OAuth 2 in Action
Justin Richer - 2017
    You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions
Mastering VMware vSphere 4
Scott Lowe - 2009
    Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.
The Potter's Wheel
Vincent Chukwuemeka Ike - 1973
    In this novel, he tells of Obuechina, the only brother of six older sisters, prize pupil in the village school, apple of his doting mother's eye, eight years old and hopelessly spoilt. In a vain attempt to salvage his character, his father decides he must be sent away as a servant to a schoolmaster with a dragon of a wife. Obu goes - and comes back very different.
First Ink
Amy L. Gale - 2017
    He avoids relationships lasting more than a few hours and sets his sights on breaking out of this college town and opening a shop in Miami. Hailey Matthews is ready to leave her college days behind her except for one last hoorah, getting matching tattoos with her sorority sisters by the best artists in the Tri-state area at Steele Ink. After passing out twice a few minutes into the tattoo, Vic Steele refuses to touch her skin again, at least not with the tattoo gun. When she shows up at his shop day after day demanding he finish the tattoo he finally agrees with one stipulation, she goes out to dinner with him. They both get more than they bargained for when their feelings take them by surprise and Hailey finds herself in the midst of the full Vic Steele experience, but Vic’s playboy status comes back to haunt him threating to ruin it all. Will Hayley’s first ink be her last or will Vic leave a permanent scar?
Tokens of Trust
Rowan Williams - 2007
    With vast knowledge of Christian history and theology and characteristically elegant prose, Rowan Williams is a superb and compassionate guide through the richness and depth of Christian faith.
Systems Performance: Enterprise and the Cloud
Brendan Gregg - 2013
    Now, internationally renowned performance expert Brendan Gregg has brought together proven methodologies, tools, and metrics for analyzing and tuning even the most complex environments. Systems Performance: Enterprise and the Cloud focuses on Linux(R) and Unix(R) performance, while illuminating performance issues that are relevant to all operating systems. You'll gain deep insight into how systems work and perform, and learn methodologies for analyzing and improving system and application performance. Gregg presents examples from bare-metal systems and virtualized cloud tenants running Linux-based Ubuntu(R), Fedora(R), CentOS, and the illumos-based Joyent(R) SmartOS(TM) and OmniTI OmniOS(R). He systematically covers modern systems performance, including the "traditional" analysis of CPUs, memory, disks, and networks, and new areas including cloud computing and dynamic tracing. This book also helps you identify and fix the "unknown unknowns" of complex performance: bottlenecks that emerge from elements and interactions you were not aware of. The text concludes with a detailed case study, showing how a real cloud customer issue was analyzed from start to finish. Coverage includes - Modern performance analysis and tuning: terminology, concepts, models, methods, and techniques - Dynamic tracing techniques and tools, including examples of DTrace, SystemTap, and perf - Kernel internals: uncovering what the OS is doing - Using system observability tools, interfaces, and frameworks - Understanding and monitoring application performance - Optimizing CPUs: processors, cores, hardware threads, caches, interconnects, and kernel scheduling - Memory optimization: virtual memory, paging, swapping, memory architectures, busses, address spaces, and allocators - File system I/O, including caching - Storage devices/controllers, disk I/O workloads, RAID, and kernel I/O - Network-related performance issues: protocols, sockets, interfaces, and physical connections - Performance implications of OS and hardware-based virtualization, and new issues encountered with cloud computing - Benchmarking: getting accurate results and avoiding common mistakes This guide is indispensable for anyone who operates enterprise or cloud environments: system, network, database, and web admins; developers; and other professionals. For students and others new to optimization, it also provides exercises reflecting Gregg's extensive instructional experience.
Mac OS X Internals: A Systems Approach
Amit Singh - 2006
    Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.
Regular Expressions Cookbook
Jan Goyvaerts - 2009
    Every programmer can find uses for regular expressions, but their power doesn't come worry-free. Even seasoned users often suffer from poor performance, false positives, false negatives, or perplexing bugs. Regular Expressions Cookbook offers step-by-step instructions for some of the most common tasks involving this tool, with recipes for C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET.With this book, you will:Understand the basics of regular expressions through a concise tutorial Use regular expressions effectively in several programming and scripting languages Learn how to validate and format input Manage words, lines, special characters, and numerical values Find solutions for using regular expressions in URLs, paths, markup, and data exchange Learn the nuances of more advanced regex features Understand how regular expressions' APIs, syntax, and behavior differ from language to language Write better regular expressions for custom needs Whether you're a novice or an experienced user, Regular Expressions Cookbook will help deepen your knowledge of this unique and irreplaceable tool. You'll learn powerful new tricks, avoid language-specific gotchas, and save valuable time with this huge library of proven solutions to difficult, real-world problems.
Linux Bible
Christopher Negus - 2005
    Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get startedThis practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.
My Isl@m: How Fundamentalism Stole My Mind - And Doubt Freed My Soul
Amir Ahmad Nasr - 2013
    And it has the power to help ignite a revolution and blow apart the structures of ignorance and politicized indoctrination that too often still imprison the Muslim mind.Part memoir, part passionate call for liberty, reason and doing work that matters, My Isl@m tells the tale of how the internet opened the eyes and heart of a once fearful young Muslim to a world beyond the dogmatism of his upbringing, and recounts his transformation into a defiant digital activist.In his honest, provocative, and courageous debut, Nasr–a popular Afro-Arab Sudanese blogger–steps out from behind the curtain of anonymity and emerges as a voice of a new generation of tech-savvy liberal Muslims.Set in war-ravaged Sudan, oil-rich Qatar, multi-cultural Malaysia, the United States, Turkey and the new frontiers of cyberspace, My Isl@m is a fascinating prelude to the Arab Spring and a disarming and uplifting tale of doubt, soul-searching, Islam, and finding freedom in the Middle East and the rest of the Muslim world.A poignant, honest, and uplifting memoir of how blogging and the internet opened the eyes and heart of one young Muslim man to a world beyond his religious fundamentalist upbringing.
Daughter of Catalonia
Jane MacKenzie - 2014
    Not everything is easy to discover.' In war-torn France, charismatic Spaniard Luis elopes with high-born Elise from Paris and takes her to live in a small village in Catalonia. Little do they know that war will rip them apart, sending Elise into unhappy exile in England, and Luis to his death in the Resistance. Many years later their daughter Madeleine returns to France to seek out her roots and the truth of her parents' story. But her arrival in the Catalan village of her childhood unleashes more than she had bargained for, as Madeleine confronts the secrets of war and learns the shocking truth behind her father's death. And as her own love story begins, she must come to terms with her past, and learn to forgive and to believe in the legacy of love her parents left behind.
