jQuery: Novice to Ninja


Earle Castledine - 2010
    In this question-and-answer book on jQuery, you'll find a cookbook of ready-to-go solutions to help breathe life into your web page. Topics covered include: - Scrolling, Resizing and Animating Webpage elements - Backgrounds, Slideshows, and Crossfaders - Menus, Tabs, and Panels - Buttons, Fields, and Controls - Lists, Trees, and Tables - Frames, Windows, and Dialogs - Adding interactivity with Ajax - Using the jQuery User Interface Themeroller - Writing your own jQuery plug-ins All code used to create each solution is available for download and guaranteed to be simple, efficient and cross-browser compatible.

Professional Wordpress Plugin Development


Brad Williams - 2011
    Now you can extend it for personal, corporate and enterprise use with advanced plugins and this professional development guide. Learn how to create plugins using the WordPress plugin API: utilize hooks, store custom settings, craft translation files, secure your plugins, set custom user roles, integrate widgets, work with JavaScript and AJAX, create custom post types. You'll find a practical, solutions-based approach, lots of helpful examples, and plenty of code you can incorporate!Shows you how to develop advanced plugins for the most popular CMS platform today, WordPress Covers plugin fundamentals, how to create and customize hooks, internationalizing your site with translation files, securing plugins, how to create customer users, and ways to lock down specific areas for use in corporate settings Delves into advanced topics, including creating widgets and metaboxes, debugging, using JavaScript and AJAX, Cron integration, custom post types, short codes, multi site functions, and working with the HTTP API Includes pointers on how to debug, profile and optimize your code, and how to market your custom plugin Learn advanced plugin techniques and extend WordPress into the corporate environment.

TCP/IP Network Administration


Craig Hunt - 1992
    The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet.Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail.With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains:Overview of TCP/IP Delivering the data Network services Getting startedM Basic configuration Configuring the interface Configuring routing Configuring DNS Configuring network servers Configuring sendmail Configuring Apache Network security Troubleshooting Appendices include dip, ppd, and chat reference, a gated reference, a dhcpd reference, and a sendmail reference This new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars.Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet.

Domain-Driven Design Distilled


Vaughn Vernon - 2016
    Now, for the first time, there's an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly gain value from it. Concise, readable, and actionable, Domain-Driven Design Distilled never buries you in detail-it focuses on what you need to know to get results. Vaughn Vernon, author of the best-selling Implementing Domain-Driven Design, draws on his twenty years of experience applying DDD principles to real-world situations. He is uniquely well-qualified to demystify its complexities, illuminate its subtleties, and help you solve the problems you might encounter. Vernon guides you through each core DDD technique for building better software. You'll learn how to segregate domain models using the powerful Bounded Contexts pattern, to develop a Ubiquitous Language within an explicitly bounded context, and to help domain experts and developers work together to create that language. Vernon shows how to use Subdomains to handle legacy systems and to integrate multiple Bounded Contexts to define both team relationships and technical mechanisms. Domain-Driven Design Distilled brings DDD to life. Whether you're a developer, architect, analyst, consultant, or customer, Vernon helps you truly understand it so you can benefit from its remarkable power. Coverage includes What DDD can do for you and your organization-and why it's so important The cornerstones of strategic design with DDD: Bounded Contexts and Ubiquitous Language Strategic design with Subdomains Context Mapping: helping teams work together and integrate software more strategically Tactical design with Aggregates and Domain Events Using project acceleration and management tools to establish and maintain team cadence

Our Poison Horse


Derrick Brown - 2014
    Brown. Brown is the winner of the Texas Book of The Year Prize, 2013. The New York Times calls his work a rekindling of the faith in the shocking, weird and beautiful power of words. Brown finally sold the ship, The Sea Section, upon which he lived for years in the Long Beach harbor, after which he took to hunting for a city that was affordable and had a bustling writer s community. He landed in Austin, Texas and when the progress of that town got to be intense, he moved to the nearby countryside in Elgin, Texas, and from that pastoral setting came unfurling this new collection of his most personal work to date. Brown has been known as one of the most touring, well travelled living poets in America. He has based his whole writing career on changing peoples minds about poetry and he feels a quality, unforgettable live experience can achieve that. Brown told himself he needed a 10-year hiatus from writing poetry when he felt the well of creativity had dried up. 2 years ago, he wrote a one-hour long poetic play called Strange Light, commissioned by The Noord Nederlands Dans Group in Holland. The piece was performed by 14 dancers and accompanied by a live orchestra using music composed by fellow Americans, Emily Wells and Timmy Straw. While he was working on a new libretto for Wayne State University in Detroit, he was set up in a seemingly pastoral country setting, where, as Brown says, an incredible war broke out inside and out, such bright, massive storms, snakes, guns, howling wind, hard sun: all kinds of poems gushed forth. I gave in to the process and my best work to date was born, this will be my 5th book. Our Poison Horse touches on more autobiography than the romantic and fantastical that was so present in his past work. In Derrick Brown s words: I found a poetry in the real events that shaped or broke me. Every morning, I would quiet down, stare out into the field where we were watching our neighbors horse, a horse that was poisoned with pesticide by some local boys, a horse with massive scars all down its body from it s skin peeling from the poison sprayed upon it maliciously by some bastard kids. I watched the horse heal and finally come to me, and trust me and eat carrots. Something about that horse, Lacey, about it not trusting me and then warming up pulled something out of me that I didn t know I was ready for. There is a theme that in beautiful places, you will"

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers


Kevin D. Mitnick - 2005
    In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Mastering Regular Expressions


Jeffrey E.F. Friedl - 1997
    They are now standard features in a wide range of languages and popular tools, including Perl, Python, Ruby, Java, VB.NET and C# (and any language using the .NET Framework), PHP, and MySQL.If you don't use regular expressions yet, you will discover in this book a whole new world of mastery over your data. If you already use them, you'll appreciate this book's unprecedented detail and breadth of coverage. If you think you know all you need to know about regularexpressions, this book is a stunning eye-opener.As this book shows, a command of regular expressions is an invaluable skill. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Regular expressions can save you time and aggravation. They can be used to craft elegant solutions to a wide range of problems. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them.Yet despite their wide availability, flexibility, and unparalleled power, regular expressions are frequently underutilized. Yet what is power in the hands of an expert can be fraught with peril for the unwary. Mastering Regular Expressions will help you navigate the minefield to becoming an expert and help you optimize your use of regular expressions.Mastering Regular Expressions, Third Edition, now includes a full chapter devoted to PHP and its powerful and expressive suite of regular expression functions, in addition to enhanced PHP coverage in the central "core" chapters. Furthermore, this edition has been updated throughout to reflect advances in other languages, including expanded in-depth coverage of Sun's java.util.regex package, which has emerged as the standard Java regex implementation.Topics include:A comparison of features among different versions of many languages and toolsHow the regular expression engine worksOptimization (major savings available here!)Matching just what you want, but not what you don't wantSections and chapters on individual languagesWritten in the lucid, entertaining tone that makes a complex, dry topic become crystal-clear to programmers, and sprinkled with solutions to complex real-world problems, Mastering Regular Expressions, Third Edition offers a wealth information that you can put to immediateuse.Reviews of this new edition and the second edition: "There isn't a better (or more useful) book available on regular expressions."--Zak Greant, Managing Director, eZ Systems"A real tour-de-force of a book which not only covers the mechanics of regexes in extraordinary detail but also talks about efficiency and the use of regexes in Perl, Java, and .NET...If you use regular expressions as part of your professional work (even if you already have a good book on whatever language you're programming in) I would strongly recommend this book to you."--Dr. Chris Brown, Linux Format"The author does an outstanding job leading the reader from regexnovice to master. The book is extremely easy to read and chock full ofuseful and relevant examples...Regular expressions are valuable toolsthat every developer should have in their toolbox. Mastering RegularExpressions is the definitive guide to the subject, and an outstandingresource that belongs on every programmer's bookshelf. Ten out of TenHorseshoes."--Jason Menard, Java Ranch

Pilot's Handbook of Aeronautical Knowledge: FAA-H-8083-25A


Federal Aviation Administration - 1980
    This updated guide covers a wide array of fundamental subjects, including principles of flight, aircraft and engine structures, charts and graphs, performance calculations, weather theory, reports, forecasts, and flight manuals. Required reading for pilots for more than 25 years and formerly published as an Advisory Circular (AC 61-23C), this new edition is now listed as an official FAA Handbook.

The Complete Do-it-Yourself Manual Newly Updated


Family Handyman Magazine - 2005
    Over 10 million copies of READER’S DIGEST COMPLETE DO-IT-YOURSELF MANUAL have been sold since it's original publication in 1973. In 2005, the manual got bigger and better than ever, when The Family Handyman and Reader’s Digest joined forces and completely revised, updated, rewrote, and redesigned this home improvement classic. Now in 2014, The Family Handyman has once again updated and revised this do-it-yourself classic to make it relevant to today’s homeowners and DIYers.. Written in a style of text that addresses readers in a very accessible, conversational tone for easy, user-friendly assistance with every do-it-yourself task. All instructions and materials have been updated to address current codes (electrical, plumbing and building), and revised to indicate the very latest in materials, tools, and technology. Suitable for beginners and experts alike, this newly revised edition includes: • Over 3,000 photos and illustrations to make complex projects and repairs easy to understand • Twice as many storage projects that help home owners cut clutter • New building materials that yield great-looking, long-lasting results—and low maintenance! • New technology that lets homeowners save energy, add convenience or improve security. • New building codes that make homes safer, more energy-efficient and trouble-free. The book’s tried-and-true instructions provide do-it-yourself solutions to a ton of problems that could cost a fortune if you had to hire a professional. This manual is a “must-have” reference guide for every home-owning man or woman.

Introductory Statistics with R


Peter Dalgaard - 2002
    It can be freely downloaded and it works on multiple computer platforms. This book provides an elementary introduction to R. In each chapter, brief introductory sections are followed by code examples and comments from the computational and statistical viewpoint. A supplementary R package containing the datasets can be downloaded from the web.

DNS and BIND


Cricket Liu - 1996
    This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module

The Photoshop Cs2 Book for Digital Photographers


Scott Kelby - 2005
    You'll learn the tricks for fixing common problems, retouching secrets, how to colour correct any photo, and a whole chapter is dedicated to Photoshop special effects.

Design Of Steel Structures


N. Subramanian - 2008
    The text is based on the modern limit states approach to design and covers areas such as the properties of steel, types of steel structures, important areas of structural steel technology, bolted connections, welded connection, design of trusses, design of plate girders, and design of beam columns. Each chapter features solved examples, review questions, and practice problems as well as ample illustrations that supplement the text. Chapters on advanced topics such as protection of steel structures against corrosion and fire, fatigue resistant design, and design for torsion have been included in a CD that accompanies the book.

Lean Change Management: Innovative practices for managing organizational change


Jason Little - 2013
    The book will do that through examples of how innovative practices can dramatically improve the success of change programs. These practices combine ideas from the Agile, Lean Startup, change management, organizational development and psychology communities. This book will change how you think about change. In this book we will cover: Why does change resistance emerge and what you should NOT do about it. And of course, how to harness that human reaction to the benefit of all involved in the change process. Step-by-step descriptions of how we combined ideas from many change methods and frameworks to develop a customized change management process that was right for The Commission. How you can customize your own change program just like we did at The Commission. How you can involve the people affected in the change in the design of that change. Directly contributing to the success of the change program. A newly appointed CIO had shaken the place up with some big changes, including a transition away from traditional management practices and towards Agile practices. How to implement these modern approaches to management in a very traditional organization? A new approach to change was needed. Lean Change Management was needed. This book describes how myself and team of change agents helped The Commission transform from an old-school public sector to a modern Agile organization. Was it easy? Of course not. But it was possible because of the innovative practices for Change Management that I describe in this book.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.