The Atomic Chef: And Other True Tales of Design, Technology, and Human Error


Steven Casey - 2006
    The 20 stand-alone chapters of this new work describe how technological failures result from the incompatibilities between the way things are designed and the way people actually perceive, think, and act. New technologies will succeed or fail based on our ability to minimize these incompatibilities between the characteristics of people and the characteristics of the things we create and use.This book is the quintessential 'must read' for all those who deal with technology in any fashion. From the frustration of an awkward ATM machine to the threat of accidental, nuclear Armageddon, Casey shows how the same crucial factors come into play told through the very eyes of those people who saw and experienced these things. No student of design, psychology, behavioral science, or technology should be without this book, and neither should any intelligent member of society who wants to know what goes on with the successes and failures of modern technology.Sit ringside to the action where compelling events unfold. The stories in this book will take you to airports and airline cabins, an amusement park, a fertility clinic, a pharmaceutical plant, an emergency dispatch center, the Olympic games, and a bank; to hospitals, spacecraft, ships, and cars. From the coasts of Peru and Monterey, in orbit aboard the International Space Station, the freeways of Southern California and the back roads of France, the battlefields of Afghanistan, and a nuclear fuel plant in Japan this is The Atomic Chef.

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

Data Structures: A Pseudocode Approach with C


Richard F. Gilberg - 1998
    A new four-part organizational structure increases the flexibility of the text, and all material is presented in a straightforward manner accompanied by an array of examples and visual diagrams.

Electronic Communication Systems


George Kennedy - 1977
    George Kennedy Supervising Engineer, Overseas Telecommunications Commission, Australia.

Effective Perl Programming


Joseph Hall - 1997
    The language features full support for regular expressions, object-oriented modules, network programming, and process management. Perl is extensible, and supports modular, cross-platform development.In "Effective Perl Programming," Perl experts Joseph Hall and Randal Schwartz share programming solutions, techniques, programming pointers, rules of thumb, and the pitfalls to avoid, enabling you to make the most of Perl's power and capabilities.The authors will help you develop a knack for the right ways to do things. They show you how to solve problems with Perl, and how to debug and improve your Perl programs. Offering examples, they help you learn good Perl style. Geared for programmers who have already acquired Perl basics, the book will extend your skill range, providing the tactics and deeper understanding you need to create Perl programs that are more elegant, effective, and succinct. This book also speaks to those who want to become more fluent, expressive, and individualistic Perl programmers.To help you design and write effective Perl progams, Effective Perl Programming includes: Perl basics Idiomatic Perl Regular expressions Subroutines References Debugging Usage of packages and modules Object-oriented programming Useful and interesting Perl miscellanyNumerous thought-provoking examples appear throughout the book, highlighting many of the subtleties that make Perl such a fascinating, fun, and effective language to work with.

CISSP for Dummies [With CDROM]


Lawrence C. Miller - 2002
    The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertiseCD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versions"CISSP For Dummies, 3rd Edition" can lead you down the rough road to certification successNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

The Lean Marketplace: A Practical Guide to Building a Successful Online Marketplace Business


Juho Makkonen - 2018
    The applicable tactics and techniques can be studied in advance, helping you avoid the most common pitfalls.This is what this book is about. It's a handbook for anyone building an online marketplace. The same methods will apply whether your organization is a startup, a cooperative, a non-profit, or a big brand. Not every marketplace will be as big as Airbnb and Uber, but we believe there are thousands of marketplace ideas out there that can make for great, sustainable businesses. With the help of this book, you're one step closer to building the next one. Critical acclaim "Juho and Cristóbal have written a practical in-the-weeds guide on marketplace execution that will prove invaluable for all entrepreneurs looking to start a marketplace. No fluff, just actionable ideas." – Sangeet Paul Choudary, best-selling author of Platform Revolution and Platform Scale "Building marketplaces can be hard. The Lean Marketplace is a very useful step-by-step guide to help entrepreneurs think through the challenges and solutions to create the next Uber or Airbnb." – Boris Wertz, Founder and General Partner, Version One Ventures "Must read for every marketplace entrepreneur. I'm going to ask everyone in our team to read this book." – Bram de Zwart, Co-founder and CEO, 3D Hubs "As I'm friends with both authors, I know first hand that the information in their book is hard won from long experience helping dozens of marketplaces succeed and consulting the top experts from around the world. However, the quality and comprehensiveness of the content speaks for itself. It covers all the essentials of growing an online marketplace, and in the most straightforward way possible. It is an impressively practical, must read resource for any current or aspiring marketplace entrepreneur. I can't recommend it highly enough, but please see for yourself." – Neal Gorenflo, Co-founder of Shareable "The essential guide to building an essential marketplace." – Tristan Pollock, Co-founder, Storefront, Partner, 500 Startups "Reading Juho's and Cristobal's advice online before launching our platform helped us save so much time and avoid the most common mistakes. If you're considering building a marketplace business, read this book first. Seriously." – Agne Milukaite, Co-founder and CEO, Cycle.land "Envisioning, validating, building and growing a marketplace is no small challenge: the most important aspect to nailing this challenge down is all about avoiding losing time and energy in the myriad of wrong directions that can come up your way. This book is an essential guide, the lifeboat for the marketplace founder that faces the ocean of bootstrapping.

Bash Command Line Pro Tips


Jason Cannon - 2014
     As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.

Twelve Clean Pages


Nika Maples - 2011
    Not only did she stand, obliterating doctors initial prognoses, she walked ... directly into the passionate profession of a public high school teacher. Thirteen years after the medical trauma she was not expected to survive, Nika stood inside the glimmering granite capitol building in Austin, honored to receive state House and Senate resolutions as 2007 Texas Secondary Teacher of the Year. Let your heart rise along with the inspirational account of a single mother's faith, her dying daughter's hope, and God's triumphant love.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Marketing To The Social Web: How Digital Customer Communities Build Your Business


Larry Weber - 2007
    CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities." -Mark Fuller, Chairman, Monitor Group "Consumers are using technology to grab power from companies, the media, and the government. Marketing to the Social Web succinctly outlines how institutions can survive and win in this chaotic new world, and lays out the revised rules of engagement-ignore them at your peril." -George F. Colony, CEO, Forrester Research, Inc. "Larry has brought pragmatic and useful recommendations to help brand builders manage the complexity of social interaction in a digital age. I was pleased to read a book that actually suggests how to do something with social networks, instead of just ponder them." -David Kenny, Chairman and Chief Executive Officer, Digitas Inc. "Where's the allure of social 2.0? Brands can talk . . . customers talk louder! Digital influence has arrived." -Jeff Taylor, CEO, Eons and Founder of Monster.com "Larry Weber provides a simple and effective roadmap of the new customer information highway. Marketing to the Social Web is a valuable tool that will give everyone the confidence and know-how to compete in this fast-growing marketplace of ideas." -Steve Harris, Vice President, Global Communications, General Motors Corporation "As all lines and boundaries are washed away by the Web, Weber describes how to become part of the sea versus the sand." -Nicholas Negroponte, Chairman, One Laptop per Child

Uncorked: My Journey Through the Crazy World of Wine


Marco Pasanella - 2012
    Pasanella takes the reader into the underbelly of his store and the industry, which is steeped in history yet fanatical about technology and brimming with larger-than-life personalities. Infused with rich details of his historic waterfront building in New York City and his sojourns to Tuscany, Pasanella's memoir is one of transformation through a project many fantasize about but few commit to. A colorful cast of characters rounds out this fascinating journey through the world of wine.

Pivot to the Future: Discovering Value and Creating Growth in a Disrupted World


Omar Abbosh - 2019
    But what is new is the "wise pivot," a replicable strategy for harnessing disruption to survive, grow, and be relevant to the future. It's a strategy for perpetual reinvention across the old, now, and new elements of any business.Rapid recent advances in technology are forcing leaders in every business to rethink long-held beliefs about how to adapt to emerging technologies and new markets. What has become abundantly clear: in the digital age, conventional wisdom about business transformation no longer works, if it ever did.Based on Accenture's own experience of reinventing itself in the face of disruption, the company's real world client work, and a rigorous two-year study of thousands of businesses across 30 industries, Pivot to the Future reveals methodical and bold moves for finding and releasing new sources of trapped value-unlocked by bridging the gap between what is technologically possible and how technologies are being used. The freed value enables companies to simultaneously reinvent their legacy, and current and new businesses.Pivot to the Future is for leaders who seek to turn the existential threats of today and tomorrow into sustainable growth, with the courage to understand that a wise pivot strategy is not a one-time event, but a commitment to a future of perpetual reinvention, where one pivot is followed by the next and the next.

JavaScript Bible


Danny Goodman - 1996
    Part tutorial and part reference, the book serves as a learning tool for building new JavaScript skills and a detailed reference for seasoned JavaScript developers. Danny Goodman's exclusive interactive workbench, The Evaluator, makes it easy to master JavaScript and DOM concepts. Offers deployment strategies that best suit the user's content goals and target audience.Bonus CD-ROM is packed with advanced content for the reader who wants to go an extra step.

Visual C++ Programming


Yashavant P. Kanetkar - 2004