VI Editor Pocket Reference (Pocket Reference


Arnold Robbins - 1998
    Even those who know vi often make use of only a small number of its features.The vi Editor Pocket Reference is a companion volume to O'Reilly's updated sixth edition of Learning the vi Editor, a complete guide to text editing with vi. New topics in Learning the vi Editor include multi-screen editing and coverage of four vi clones: vim, elvis, nvi, and vile.This small book is a handy reference guide to the information in the larger volume, presenting movement and editing commands, the command-line options, and other elements of the vi editor in an easy-to-use tabular format.

Nicely Said: Writing for the Web with Style and Purpose


Nicole Fenton - 2014
    You’ll learn how to write web copy that addresses your readers’ needs and supports your business goals.Learn from real-world examples and interviews with people who put these ideas into action every day: Kristina Halvorson of Brain Traffic, Tiffani Jones Brown of Pinterest, Gabrielle Blair of Design Mom, Mandy Brown of Editorially, Randy J. Hunt of Etsy, Sarah Richards of GOV.UK, and more.Topics:* Write marketing copy, interface flows, blog posts, legal policies, and emails* Develop behind-the-scenes documents like mission statements, survey questions, and project briefs* Find your voice and adapt your tone for different situations* Build trust and foster relationships with readers* Make a simple style guide and collaborate with your team

Running Linux


Matt Welsh - 1995
    This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an enjoyable environment for personal computing, learning system administration and programming skills, and all-around hacking.This book, now in its third edition, has been widely recognized for years in the Linux community as the getting-started book people need. It goes into depth about configuration issues that often trip up users but are glossed over by other books.A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and at a low cost from many vendors. Developed first on the PC, it has been ported to many other architectures and can now support such heavy-duty features as multiprocessing, RAID, and clustering.Software packages on Linux include the Samba file server and Apache Web server; the X Window System (X11R6); TCP/IP networking (including PPP, SSH, and NFS support); popular software tools such as Emacs and TeX; a complete software development environment including C, C++, Java, Perl, Tcl/Tk, and Python; libraries, debuggers, multimedia support, scientific and database applications, and much more. Commercial applications that run on Linux range from end-user tools like word processors and spreadsheets to mission-critical software like the Oracle, Sybase, Informix, and IBM DB/2 database management systems.Running Linux has all the information you need to understand, install, and start using the Linux operating system. This includes a comprehensive installation tutorial, complete information on system maintenance, tools for document development and programming, and guidelines for network, file, printer, and Web site administration.

Run with Power: The Complete Guide to Power Meters for Running


Jim Vance - 2016
    From 5K to ultramarathon, a power meter can make you faster—but only if you know how to use it. Just viewing your numbers is not enough; you can only become a faster, stronger, more efficient runner when you know what your key numbers mean for your workouts, races, and your season-long training. In Run with Power, TrainingBible coach Jim Vance offers the comprehensive guide you need to find the speed you want.Run with Power demystifies the data and vocabulary so you can find and understand your most important numbers. You’ll set your Running Power Zones so you can begin training using 8 power-based training plans for 5K, 10K, half-marathon, and marathon. Vance shows you how you can compare wattage, heart rate, pace, and perceived exertion to gain the maximum insight into your performances, how you respond to training, and how you can train more effectively. Run with Power will revolutionize how you train and race. Armed with Vance’s guidance, you can train more specifically for races, smooth your running technique, accurately measure your fitness, predict a fitness plateau, monitor injuries, know exactly how hard you’re training, get more fitness from every workout, recover fully, perfect your tapers, warm up without wasting energy, pace your race on any terrain, know when to open the throttle, and create an unprecedented picture of yourself as an athlete.If you’re just glancing at the number on your wrist or computer monitor, you’ve got a lot more speed potential. Knowledge is power and understanding your power numbers can open the gate to new methods and new PRs. Run with Power introduces the use of power meters to the sport of running and will show you how to break through to all-new levels of performance.Key concepts explored in Run with Power: 3/9 Test, 30-minute Time Trial Test, Running Functional Threshold Power (rFTPw), Running Functional Threshold Pace (rFTPa), Averaged and Normalized Power (NP), Intensity Factor (IF), Peak Power, Variability Index, Efficiency Index (EI), speed per watt, Vance’s Power Zones for Running, Training Stress Score (TSS), and Periodization with Power. Includes 6 testing methods and 8 power-based training schedules and workouts for 5K, 10K, half-marathon, and marathon.

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

XML in a Nutshell


Elliotte Rusty Harold - 2001
    But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

Thirty Seconds to Impact


Peter Burkill - 2010
    It was not until moments before landing that anything went wrong. Coming in to Heathrow Airport, the plane suffered inexplicable loss of power to both engines, and it was suddenly likely that the plane would plough into a built-up area outside the airport, with the loss of all lives on board. Peter tells us in graphic detail his thoughts and actions when he managed to help save the plane at the last moment thanks to a flash of inspiration that led him to change the position of the wing flaps, which appeared to gain the vehicle enough precious time to make it over the perimeter fence and land on the grass, short of the runway. For both Maria and Peter, their lives following the crash have resulted in experiences that they never would have expected to have happened. There isn't a handbook with rules to follow after a crash so the subsequent aftermath was laced with events that could have been handled better from all sides, which lead to Maria and Peter having to find strength inside them that they had never needed before. A little more than a year later, they have used these strengths to begin a new chapter in their lives; starting with leaving British Airways and celebrating a second chance to enjoy life.But there are still nights when they find themselves awake, crying about what could have happened on that fateful day.

Lean Analytics: Use Data to Build a Better Startup Faster


Alistair Croll - 2013
    Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find the right customers, decide what to build, how to monetize your business, and how to spread the word. Packed with more than thirty case studies and insights from over a hundred business experts, Lean Analytics provides you with hard-won, real-world information no entrepreneur can afford to go without.Understand Lean Startup, analytics fundamentals, and the data-driven mindsetLook at six sample business models and how they map to new ventures of all sizesFind the One Metric That Matters to youLearn how to draw a line in the sand, so you’ll know it’s time to move forwardApply Lean Analytics principles to large enterprises and established products

The S.N. Killer


Shameek Speight - 2012
    In these current times there is not aperson that isn’t somehow linked to a social networking site. Technology has evolved in ways that allow you to access such sites from your iPad or cellphone. With that said, do you know the person behind your next friend request? Do you know the person behind that profile picture, or better yet the person you’ve been chatting with for months or the person you been flirting with, or do you just think you know? Detective Lauren Pitman and her partner Detective Alexis Lovett head a Special Division Unit, in charge of solving Internet Crimes. Those crimes include rape, homicide and missing persons to name a few. Recently women have been targeted throughout the Tri-State Area. Several victims have been found dead with missing body parts. What these women seem to have in common is that all these women were all online on different social networking sites, talking and interacting with a man, who police cannot seem to be able to trace or locate almost as if he doesn’t exist. A recent development has found that this particular social network killer is into cannibalism. Detective Lauren Pitman and Alexis Lovett must work fast to uncover the killers identity before he claims his next victim.

Frontiers of Electronic Commerce


Ravi Kalakota - 1996
    This work is aimed at the business person who wants to understand the revolution taking place in electronic commerce. It explains the emerging technology and network infra-structure, and emphasizes the business applications and mercantile strategies, challenges and opportunities of conducting business on the information superhighway. The study also describes pertinent standards and protocols.

Advanced Perl Programming


Sriram Srinivasan - 1997
    Perhaps you've taken on a larger project than the ones you're used to. Or you want to add a user interface or a networking component. Or you need to do more complicated error trapping.Whether your knowledge of Perl is casual or deep, this book will make you a more accomplished programmer. Here you can learn the complex techniques for production-ready Perl programs. This book explains methods for manipulating data and objects that may have looked like magic before. Furthermore, it sets Perl in the context of a larger environment, giving you the background you need for dealing with networks, databases, and GUIs. The discussion of internals helps you program more efficiently and embed Perl within C or C within Perl.Major topics covered include:Practical use of packages and classes (object-oriented programming) Complex data structures Persistence (e.g., using a database) Networking Graphical interfaces, using the Tk toolkit Interaction with C language functions Embedding and extending the Perl interpreterIn addition, the book patiently explains all sorts of language details you've always wanted to know more about, such as the use of references, trapping errors through the eval operator, non-blocking I/O, when closures are helpful, and using ties to trigger actions when data is accessed. You will emerge from this book a better hacker, and a proud master of Perl.

C# 5.0 in a Nutshell: The Definitive Reference


Joseph Albahari - 2012
    Uniquely organized around concepts and use cases, this updated fifth edition features a reorganized section on concurrency, threading, and parallel programming—including in-depth coverage of C# 5.0’s new asynchronous functions.Shaped by more than 20 expert reviewers, including Microsoft’s Eric Lippert, Stephen Toub, Chris Burrows, and Jon Skeet, this book has all you need to stay on track with C# 5.0. It’s widely known as the definitive reference on the language.Get up to speed on C# language basics, including syntax, types, and variablesExplore advanced topics such as unsafe code and type varianceDig deep into LINQ via three chapters dedicated to the topicLearn about code contracts, dynamic programming, and parallel programmingWork with .NET features, including reflection, assemblies, memory management, security, I/O, XML, collections, networking, and native interoperability"C# 5.0 in a Nutshell is one of the few books I keep on my desk as a quick reference." —Scott Guthrie, Microsoft"Whether you’re a novice programmer or an expert who wants to improve your knowledge of modern asynchronous programming techniques, this book has the information you need to get the job done in C#." —Eric Lippert, Microsoft

The Common Core Lesson Book, K-5: Working with Increasingly Complex Literature, Informational Text, and Foundational Reading Skills


Gretchen Owocki - 2012
    This book is aimed at helping teachers implement quality Common Core instruction around this principle. -Gretchen Owocki The quality of instruction is the most important factor in helping students meet the Common Core Standards. That's why Gretchen Owocki's Common Core Lesson Book empowers teachers with a comprehensive framework for implementation that enhances existing curriculum and extends it to meet Common Core goals. Children, writes Gretchen (author of The RTI Daily Planning Book), need teachers who believe in the power of meaningful reading as a context for instruction. She breaks the CCSS reading standards into manageable chunks that emphasize engaged, authentic reading and differentiated teaching. For each standard, she offers: a clear description of what it asks from students an instructional decision tree that connects assessment to planning instructional strategies that gradually release responsibility to students techniques for intensifying instruction when readers need more support. In implementing the standards, writes Gretchen, we want children to deeply engage with multiple forms of reading. I wrote this book to offer encouragement to stay grounded in meaningful instruction, and to offer a set of strategies that emphasize meaningful reading. Respond to the Common Core with The Common Core Lesson Book-you'll help students meet the standards, and so much more.

Scaling Lean & Agile Development: Thinking and Organizational Tools for Large-Scale Scrum


Craig Larman - 2008
    However, many groups have floundered in their practice-oriented adoptions. Why? Because without a deeper understanding of the thinking tools and profound organizational redesign needed, it is as though casting seeds on to an infertile field. Now, drawing on their long experience leading and guiding large-scale lean and agile adoptions for large, multisite, and offshore product development, and drawing on the best research for great team-based agile organizations, internationally recognized consultant and best-selling author Craig Larman and former leader of the agile transformation at Nokia Networks Bas Vodde share the key thinking and organizational tools needed to plant the seeds of product development success in a fertile lean and agile enterprise. Coverage includes Lean thinking and development combined with agile practices and methods Systems thinking Queuing theory and large-scale development processes Moving from single-function and component teams to stable cross-functional cross-component Scrum feature teams with end-to-end responsibility for features Organizational redesign to a lean and agile enterprise that delivers value fast Large-scale Scrum for multi-hundred-person product groups In a competitive environment that demands ever-faster cycle times and greater innovation, applied lean thinking and agile principles are becoming an urgent priority. Scaling Lean & Agile Development will help leaders create the foundation for their lean enterprise-and deliver on the significant benefits of agility. In addition to the foundation tools in this text, see the companion book Practices for Scaling Lean & Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum for complementary action tools.

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.