Twelve Years a Slave
The basis for the Academy Award®-winning movie! Kidnapped into slavery in 1841, Northup spent 12 years in captivity. This autobiographical memoir represents an exceptionally detailed and accurate description of slave life and plantation society. 7 illustrations. Index.
The Debian Administrator s Handbook
Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world, the Debian project is cemented by its social contract. This foundation text defines the project's objective: fulfilling the needs of users with a 100% free operating system. The success of Debian and of its ecosystem of derivative distributions (with Ubuntu at the forefront) means that an increasing number of administrators are exposed to Debian's technologies. This Debian Administrator's Handbook, which has been entirely updated for Debian 8 “Jessie”, builds on the success of its 6 previous editions. Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from installation to updating the system, creating packages and compiling the kernel, but also monitoring, backup and migration, without forgetting advanced topics such as setting up SELinux or AppArmor to secure services, automated installations, or virtualization with Xen, KVM or LXC. This book is not only designed for professional system administrators. Anyone who uses Debian or Ubuntu on their own computer is de facto an administrator and will find tremendous value in knowing more about how their system works. Being able to understand and resolve problems will save you invaluable time. Learn more about the book on its official website: debian-handbook.info
JUNOS Enterprise Routing
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments. It offers complete coverage of all the services available to the JUNOS administrator, including JUNOS Enhanced Services (ES). This book is the official study guide for all three Juniper Enterprise Routing certification exams, and is highly recommended reading to pass the exams. With its field-guide emphasis on practical solutions, you can easily take the book beyond the classroom and into working networks as a design, maintenance, and troubleshooting reference par excellence. JUNOS Enterprise Routing covers all three certification exams in this track: Juniper Networks Certified Internet Associate (JNCIA-ER) Juniper Networks Certified Internet Specialist (JNCIS-ER) Juniper Networks Certified Internet Expert (JNCIE-ER) With more services such as voice, conference, and multicast on the IP router platform, the market for enterprise routers is growing exponentially, and the need for certified engineers to keep up with network developments in protocols and security is paramount. For everyone who works with Juniper enterprise and edge routing environments, this is a must-have book.
Simple and Usable Web Mobile and Interaction Design
In a complex world, products that are easy to use win favor with consumers. This is the first book on the topic of simplicity aimed specifically at interaction designers. It shows how to drill down and simplify user experiences when designing digital tools and applications. It begins by explaining why simplicity is attractive, explores the laws of simplicity, and presents proven strategies for achieving simplicity. Remove, hide, organize and displace become guidelines for designers, who learn simplicity by seeing before and after examples and case studies where the results speak for themselves.
COBIT Security Baseline
This guide, based on COBIT 4.1, consists of a comprehensive set of resources that contains the information organizations need to adopt an IT governance and control framework. COBIT covers security in addition to all the other risks that can occur with the use of IT. COBIT Security Baseline focuses on the specific risk of IT security in a way that is simple to follow and implement for the home user or the user in small to medium enterprises, as well as executives and board members of larger organizations.
PHP and MySQL by Example
Quickly master dynamic, database-driven Web development–no experience necessary! Even if you’re completely new to PHP, MySQL, and Web database development, this book will guide you through every step of building powerful, database-driven, dynamic Web sites. Direct from the world’s top scripting instructor, Ellie Quigley, PHP and MySQL by Example illuminates every concept with tested code examples, screen shots showing program output, and clear, line-by-line explanations. Classroom-tested in Ellie Quigley’s Silicon Valley training courses and at Marko Gargenta’s Marakana training company in San Francisco, this book takes you from the simplest PHP scripting and SQL querying techniques all the way to dynamic, database driven Web site construction with PHP and MySQL. From simple fill-in forms to program security and debugging, it’s the only PHP/MySQL book you’ll ever need! This book covers Complete PHP fundamentals, including operators, strings, conditionals, loops, arrays, functions, and more PHP QuickStart for more advanced readers–makes you productive with PHP in the space of just fifteen book pages Essential Web development techniques, from file handling to validating user input with regular expressions Powerful PHP features, including user-defined functions and self-processing PHP Forms Day-to-day MySQL administration A complete SQL tutorial for creating queries, retrieving data, and writing data with MySQL Session management and cookies Object Oriented PHP Best practices for using PHP and MySQL together Nearly 100,000 professionals and power users have relied on Ellie Quigley’s books to master scripting languages. With PHP and MySQL by Example, you can, too. And once you’ve become an expert, you’ll turn to this book constantly as your go-to source for reliable answers, solutions, and code. Lab Solutions Solutions to the end-of-chapter labs are available at www.prenhallprofessional.com/title/0131875086.
CD-ROM contains: Electronic version of text in HTML format.
Pro ASP NET 4 in C 2010
The complete reference for the RPM software package that is the heart of the Red Hat Linux distribution. Designed for both the novice and advanced users, Maximum RPM enables anyone to take full advantage of the benefits of building software packages with the Red Hat Package management tools to ensure that they install simply and accurately each and every time.
Fighting Computer Crime
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals: * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest computer security risk * How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems. * Effective countermeasures for each threat covered in the book * How to neutralize even the most powerful cybercrime scheme attempts * Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized