Browse Results

Showing 1,626 through 1,650 of 100,000 results

Building Web Reputation Systems

by Randy Farmer Bryce Glass

What do Amazon's product reviews, eBay's feedback score system, Slashdot's Karma System, and Xbox Live's Achievements have in common? They're all examples of successful reputation systems that enable consumer websites to manage and present user contributions most effectively. This book shows you how to design and develop reputation systems for your own sites or web applications, written by experts who have designed web communities for Yahoo! and other prominent sites.Building Web Reputation Systems helps you ask the hard questions about these underlying mechanisms, and why they're critical for any organization that draws from or depends on user-generated content. It's a must-have for system architects, product managers, community support staff, and UI designers.Scale your reputation system to handle an overwhelming inflow of user contributionsDetermine the quality of contributions, and learn why some are more useful than othersBecome familiar with different models that encourage first-class contributionsDiscover tricks of moderation and how to stamp out the worst contributions quickly and efficientlyEngage contributors and reward them in a way that gets them to returnExamine a case study based on actual reputation deployments at industry-leading social sites, including Yahoo!, Flickr, and eBay

Antifragile Systems and Teams

by Dave Zwieback

How Can DevOps Make You Antifragile?All complex computer systems eventually break, despite all of the heavy-handed, bureaucratic change-management processes we throw at them. But some systems are clearly more fragile than others, depending on how well they cope with stress. In this O’Reilly report, Dave Zwieback explains how the DevOps methodology can help make your system antifragile.Systems are fragile when organizations are unprepared to handle changing conditions. As generalists adept at several roles, DevOps practitioners adjust more easily to the fast pace of change. Rather than attempt to constrain volatility, DevOps embraces disorder, randomness, and impermanence to make systems even better.This concise report covers:Why Etsy, Netflix, and other antifragile companies constantly introduce volatility to test and upgrade their systemsHow DevOps removes the schism between developers and operations, enlisting developers to deploy as well as buildUsing continual experimentation and minor failures to make critical adjustments—and discover breakthroughsHow an overreliance on measurement and automation can make systems fragileWhy sharing increases trust, collaboration, and tribal knowledgeDownload this free report and learn how the DevOps philosophy of Culture, Automation, Measurement, and Sharing makes use of changing conditions and even embarrassing mistakes to help improve your system—and your organization.Dave Zwieback has been managing large-scale, mission-critical infrastructure and teams for 17 years.

Mastering CloudForms Automation: An Essential Guide for Cloud Administrators

by Peter McGowan

Learn how to work with the Automate feature of CloudForms, the powerful Red Hat cloud management platform that lets you administer your virtual infrastructure, including hybrid public and private clouds. This practical hands-on introduction shows you how to increase your operational efficiency by automating day-to-day tasks that now require manual input.Throughout the book, author Peter McGowan provides a combination of theoretical information and practical coding examples to help you learn the Automate object model. With this CloudForms feature, you can create auto-scalable cloud applications, eliminate manual decisions and operations when provisioning virtual machines and cloud instances, and manage your complete virtual machine lifecycle.In six parts, this book helps you:Learn the objects and concepts for developing automation scripts with CloudForms AutomateCustomize the steps and workflows involved in provisioning virtual machinesCreate and use service catalogs, items, dialogs, objects, bundles, and hierarchiesUse CloudForm’s updated workflow to retire and delete virtual machines and servicesOrchestrate and coordinate with external services as part of a workflowExplore distributed automation processing as well as argument passing and handling

Hardening Cisco Routers: Help for Network Administrators

by Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:The importance of router security and where routers fit into an overall security planDifferent router configurations for various versions of Cisco?s IOSStandard ways to access a Cisco router and the security implications of eachPassword and privilege levels in Cisco routersAuthentication, Authorization, and Accounting (AAA) controlRouter warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routersSNMP securityAnti-spoofingProtocol security for RIP, OSPF, EIGRP, NTP, and BGPLogging violationsIncident responsePhysical securityWritten by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.

Domestic Workers of the World Unite!: A Global Movement for Dignity and Human Rights

by null Jennifer N. Fish

From grassroots to global activism, the untold story of the world's first domestic workers' movement.Domestic workers exist on the margins of the world labor market. Maids, nannies, housekeepers, au pairs, and other care workers are most often ‘off the books,’ working for long hours and low pay. They are not afforded legal protections or benefits such as union membership, health care, vacation days, and retirement plans. Many women who perform these jobs are migrants, and are oftentimes dependent upon their employers for room and board as well as their immigration status, creating an extremely vulnerable category of workers in the growing informal global economy. Drawing on over a decade’s worth of research, plus interviews with a number of key movement leaders and domestic workers, Jennifer N. Fish presents the compelling stories of the pioneering women who, while struggling to fight for rights in their own countries, mobilized transnationally to enact change. The book takes us to Geneva, where domestic workers organized, negotiated, and successfully received the first-ever granting of international standards for care work protections by the United Nations’ International Labour Organization. This landmark victory not only legitimizes the importance of these household laborers’ demands for respect and recognition, but also signals the need to consider human rights as a central component of workers’ rights. Domestic Workers of the World Unite! chronicles how a group with so few resources could organize and act within the world’s most powerful international structures and give voice to the wider global plight of migrants, women, and informal workers. For anyone with a stake in international human and workers’ rights, this is a critical and inspiring model of civil society organizing.

The War on Drugs: A History

by David Farber

A revealing look at the history and legacy of the "War on Drugs"Fifty years after President Richard Nixon declared a "War on Drugs," the United States government has spent over a trillion dollars fighting a losing battle. In recent years, about 1.5 million people have been arrested annually on drug charges—most of them involving cannabis—and nearly 500,000 Americans are currently incarcerated for drug offenses. Today, as a response to the dire human and financial costs, Americans are fast losing their faith that a War on Drugs is fair, moral, or effective.In a rare multi-faceted overview of the underground drug market, featuring historical and ethnographic accounts of illegal drug production, distribution, and sales, The War on Drugs: A History examines how drug war policies contributed to the making of the carceral state, racial injustice, regulatory disasters, and a massive underground economy. At the same time, the collection explores how aggressive anti-drug policies produced a “deviant” form of globalization that offered economically marginalized people an economic life-line as players in a remunerative transnational supply and distribution network of illicit drugs. While several essays demonstrate how government enforcement of drug laws disproportionately punished marginalized suppliers and users, other essays assess how anti-drug warriors denigrated science and medical expertise by encouraging moral panics that contributed to the blanket criminalization of certain drugs. By analyzing the key issues, debates, events, and actors surrounding the War on Drugs, this timely and impressive volume provides a deeper understanding of the role these policies have played in making our current political landscape and how we can find the way forward to a more just and humane drug policy regime.

Connecting After Chaos: Social Media and the Extended Aftermath of Disaster

by null Stephen F. Ostertag

A riveting portrait of how one community used the power of culture to restore their lives and socialconnections in the years after a devastating natural disasterNatural disasters and other such catastrophes typically attract large-scale media attention and public concern in their immediate aftermath. However, rebuilding efforts can take years or even decades, and communities are often left to repair physical and psychological damage on their own once public sympathy fades away. Connecting After Chaos tells the story of how people restored their lives and society in the months and years after disaster, focusing on how New Orleanians used social media to cope with trauma following Hurricane Katrina.Stephen F. Ostertag draws on almost a decade of research to create a vivid portrait of life in “settling times,” a term he defines as a distinct social condition of prolonged insecurity and uncertainty after disasters. He portrays this precarious state through the story of how a group of strangers began blogging in the wake of Katrina, and how they used those blogs to put their lives and their city back together. In the face of institutional failure, weak authority figures, and an abundance of chaos, the people of New Orleans used social media to gain information, foster camaraderie, build support networks, advocate for and against proposed policies, and cope with trauma. In the efforts of these bloggers, Ostertag finds evidence of the capacity of this and other forms of cultural work to motivate, guide, and energize collective action aimed at weathering the constant instability of extended recovery periods. Connecting After Chaos is both a compelling story of a community in crisis and a broader argument for the power of social media and cultural cooperation to create order when chaos abounds.

Sugar, Cigars, and Revolution: The Making of Cuban New York

by null Lisandro Pérez

Winner, 2020 Herbert H. Lehman Prize for Distinguished Scholarship in New York historyHonorable Mention, 2019 CASA Literary Prize for Studies on Latinos in the United States, given by La Casa de las Américas The dramatic story of the origins of the Cuban community in nineteenth-century New York. More than one hundred years before the Cuban Revolution of 1959 sparked an exodus that created today’s prominent Cuban American presence, Cubans were settling in New York City in what became largest community of Latin Americans in the nineteenth-century Northeast. This book brings this community to vivid life, tracing its formation and how it was shaped by both the sugar trade and the long struggle for independence from Spain. New York City’s refineries bought vast quantities of raw sugar from Cuba, ultimately creating an important center of commerce for Cuban émigrés as the island tumbled into the tumultuous decades that would close out the century and define Cuban nationhood and identity. New York became the primary destination for Cuban émigrés in search of an education, opportunity, wealth, to start a new life or forget an old one, to evade royal authority, plot a revolution, experience freedom, or to buy and sell goods. While many of their stories ended tragically, others were steeped in heroism and sacrifice, and still others in opportunism and mendacity. Lisandro Pérez beautifully weaves together all these stories, showing the rise of a vibrant and influential community. Historically rich and engrossing, Sugar, Cigars, and Revolution immerses the reader in the riveting drama of Cuban New York. Lisandro Pérez analyzes the major forces that shaped the community, but also tells the stories of individuals and families that made up the fabric of a little-known immigrant world that represents the origins of New York City's dynamic Latino presence.

Missing: A play

by null John Kani

Missing is the story of Robert Khalipa, an ANC cadre living in exile, who is very senior in the organisation but is left out of the negotiations and almost forgotten in Sweden. Robert has a wealthy Swedish wife, Anna, and they have a daughter who is a practising doctor in a hospital in Stockholm. There is also Robert’s protégé Peter Tshabalala, junior in the organisation, yet he gets the call to return to South African to join the democratic government. What follows is a story of conspiracies, lies, back stabbing and disappointments. Robert and his family are faced with the challenges of a South Africa that has changed radically from the one he remembers from more than thirty years ago. The government, in his opinion, does not seem to uphold the principles enshrined in the Freedom Charter. There is also conflict within his own family. Robert wants to stay in South Africa, while his wife and daughter want to go back to Sweden. Their love is tested to breaking point and difficult decisions have to be made by every individual. As with Kani’s very successful and often-performed previous play, Nothing but the Truth, the ambiguities of freedom and of personal commitment are explored in this play.

Multiracials and Civil Rights: Mixed-Race Stories of Discrimination

by null Tanya Katerí Hernandez

Narratives of mixed-race people bringing claims of racial discrimination in court, illuminating traditional understandings of civil rights law As the mixed-race population in the United States grows, public fascination with multiracial identity has promoted the belief that racial mixture will destroy racism. However, multiracial people still face discrimination. Many legal scholars hold that this is distinct from the discrimination faced by people of other races, and traditional civil rights laws built on a strict black/white binary need to be reformed to account for cases of discrimination against those identifying as mixed-race. In Multiracials and Civil Rights, Tanya Katerí Hernández debunks this idea, and draws on a plethora of court cases to demonstrate that multiracials face the same types of discrimination as other racial groups. Hernández argues that multiracial people are primarily targeted for discrimination due to their non-whiteness, and shows how the cases highlight the need to support the existing legal structures instead of a new understanding of civil rights law. The legal and political analysis is enriched with Hernández's own personal narrative as a mixed-race Afro-Latina. Coming at a time when explicit racism is resurfacing, Hernández’s look at multiracial discrimination cases is essential for fortifying the focus of civil rights law on racial privilege and the lingering legacy of bias against non-whites, and has much to teach us about how to move towards a more egalitarian society.

Bedroom Vowel

by null Zoe Tuck

Consisting of lyric love letters to friends and musings on daily desire, nostalgia, and thirst for connection, Bedroom Vowel traces the development of an everyday philosophy formed in the social life of a creative

Ricanness: Enduring Time in Anticolonial Performance

by null Sandra Ruiz

Honorable Mention, 2020 Barnard Hewitt Award for Outstanding Research in Theatre History, given by the American Society for Theatre ResearchArgues that Ricanness operates as a continual performance of bodily endurance against US colonialismIn 1954, Dolores “Lolita” Lebrón and other members of the Puerto Rican Nationalist Party led a revolutionary action on the chambers of Congress, firing several shots at the ceiling and calling for the independence of the island. Ricanness: Enduring Time in Anticolonial Performance begins with Lebrón’s vanguard act, distilling the relationship between Puerto Rican subjectivity, gender, sexuality, and revolutionary performance under colonial time.Ruiz argues that Ricanness—a continual performance of bodily endurance against US colonialism through different measures of time—uncovers what’s at stake politically for the often unwanted, anticolonial, racialized and sexualized enduring body. Moving among theatre, experimental video, revolutionary protest, photography, poetry, and durational performance art, Ricanness stages scenes in which the philosophical, social, and psychic come together at the site of aesthetics, against the colonization of time. Analyzing the work of artists and revolutionaries like ADÁL, Lebrón, Papo Colo, Pedro Pietri, and Ryan Rivera, Ricanness imagines a Rican future through the time travel extended in their aesthetic interventions, illustrating how they have reformulated time itself through nonlinear aesthetic practices.

Conspicuous Consumption in Africa

by null Ilana van Wyk null Deborah Posel

A collection of essays examining cultures of consumption on the African continentFrom early department stores in Cape Town to gendered histories of sartorial success in urban Togo, contestations over expense accounts at an apartheid state enterprise, elite wealth and political corruption in Angola and Zambia, the role of popular religion in the political intransigence of Jacob Zuma, funerals of big men in Cameroon, youth cultures of consumption in Niger and South Africa, queer consumption in Cape Town, middle-class food consumption in Durban and the consumption of luxury handcrafted beads, this collection of essays explores the ways in which conspicuous consumption is foregrounded in various African contexts and historical moments. The essays in Conspicuous Consumption in Africa put Thorstein Veblen’s concept under robust critical scrutiny, delving into the pleasures, stresses and challenges of consuming in its religious, generational, gendered and racialised aspects, revealing conspicuous consumption as a layered set of practices, textures and relations. This volume shows how central and revealing conspicuous consumption can be to fathoming the history of Africa’s projects of modernity, and their global lineages and legacies. In its grounded, up-close case studies, it is likely to feed into current public debates on the nature and future of African societies – South African society in particular.

Capital Defense: Inside the Lives of America's Death Penalty Lawyers

by null Jon B. Gould null Maya Pagni Barak

The unsung heroes who defend the accused from the ultimate punishmentWhat motivates someone to make a career out of defending some of the worst suspected killers of our time? In Capital Defense, Jon B. Gould and Maya Pagni Barak give us a glimpse into the lives of lawyers who choose to work in the darkest corner of our criminal justice system: death penalty cases. Based on in-depth personal interviews with a cross-section of the nation’s top capital defense teams, the book explores the unusual few who voluntarily represent society’s “worst of the worst.”With a compassionate and careful eye, Gould and Barak chronicle the experiences of American lawyers, who—like soldiers or surgeons—operate under the highest of stakes, where verdicts have the power to either “take death off the table” or put clients on “the conveyor belt towards death.” These lawyers are a rare breed in a field that is otherwise seen as dirty work and in a system that is overburdened, under-resourced, and overshadowed by social, cultural, and political pressures.Examining the ugliest side of our criminal justice system, Capital Defense offers an up-close perspective on the capital litigation process and its impact on the people who participate in it.

LINQ Pocket Reference: Learn and Implement LINQ for .NET Applications (Pocket Reference (O'Reilly))

by Joseph Albahari Ben Albahari

Ready to take advantage of LINQ with C# 3.0? This guide has the detail you need to grasp Microsoft's new querying technology, and concise explanations to help you learn it quickly. And once you begin to apply LINQ, the book serves as an on-the-job reference when you need immediate reminders.All the examples in the LINQ Pocket Reference are preloaded into LINQPad, the highly praised utility that lets you work with LINQ interactively. Created by the authors and free to download, LINQPad will not only help you learn LINQ, it will have you thinking in LINQ.This reference explains:LINQ's key concepts, such as deferred execution, iterator chaining, and type inference in lambda expressionsThe differences between local and interpreted queriesC# 3.0's query syntax in detail-including multiple generators, joining, grouping, query continuations, and moreQuery syntax versus lambda syntax, and mixed syntax queries Composition and projection strategies for complex queriesAll of LINQ's 40-plus query operatorsHow to write efficient LINQ to SQL queriesHow to build expression trees from scratchAll of LINQ to XML's types and their advanced useLINQ promises to be the locus of a thriving ecosystem for many years to come. This small book gives you a huge head start."The authors built a tool (LINQPad) that lets you experiment with LINQ interactively in a way that the designers of LINQ themselves don't support, and the tool has all kinds of wonderful features that LINQ, SQL and Regular Expression programmers alike will want to use regularly long after they've read the book."-Chris Sells, Connected Systems Program Manager, Microsoft

Network Security Assessment: Know Your Network

by Chris McNab

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.

Windows Vista: The Missing Manual

by David Pogue

Windows Vista is Microsoft's most important software release in more than a decade. It offers users an abundance of new and upgraded features that were more than five years in the making: a gorgeous, glass-like visual overhaul; superior searching and organization tools; a multimedia and collaboration suite; and above all, a massive, top-to-bottom security-shield overhaul. There's scarcely a single feature of the older versions of Windows that hasn't been tweaked, overhauled, or replaced entirely. But when users first encounter this beautiful new operating system, there's gonna be a whole lotta head-scratchin', starting with trying to figure out which of the five versions of Vista is installed on the PC (Home, Premium, Business, Enterprise, Ultimate). Thankfully, Windows Vista: The Missing Manual offers coverage of all five versions. Like its predecessors, this book from New York Times columnist, bestselling author, and Missing Manuals creator David Pogue illuminates its subject with technical insight, plenty of wit, and hardnosed objectivity for beginners, veteran standalone PC users, and those who know their way around a network. Readers will learn how to: Navigate Vista's elegant new desktopLocate anything on your hard drive quickly with the fast, powerful, and fully integrated search functionUse the Media Center to record TV and radio, present photos, play music, and record any of the above to DVDChat, videoconference, and surf the Web with the vastly improved Internet Explorer 7 tabbed browserBuild a network for file sharing, set up workgroups, and connect from the roadProtect your PC and network with Vista's beefed up securityAnd much more.This jargon-free guide explains Vista's features clearly and thoroughly, revealing which work well and which don't. It's the book that should have been in the box!

Designing Multi-Device Experiences: An Ecosystem Approach to User Experiences across Devices

by Michal Levin

Welcome to our multi-device world, a world where a user’s experience with one application can span many devices—a smartphone, a tablet, a computer, the TV, and beyond. This practical book demonstrates the variety of ways devices relate to each other, combining to create powerful ensembles that deliver superior, integrated experiences to your users.Learn a practical framework for designing multi-device experiences, based on the 3Cs—Consistent, Complementary, and Continuous approachesGraduate from offering everything on all devices, to delivering the right thing, at the right time, on the best (available) deviceApply the 3Cs framework to the broader realm of the Internet of Things, and design multi-device experiences that anticipate a fully connected worldLearn how to measure your multi-device ecosystem performanceGet ahead of the curve by designing for a more connected future

Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network

by Rob Flickenger Roger Weeks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds.The second edition of Wireless Hacks, co-authored by Rob Flickenger and Roger Weeks, brings readers more of the practical tips and tricks that made the first edition a runaway hit, selling nearly 30,000 copies. Completely revised and updated, this version includes over 30 brand new hacks, major overhauls of over 30 more, and timely adjustments and touchups to dozens of other hacks introduced in the first edition. From passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, Wireless Hacks answers real-life networking needs with direct solutions.Flickenger and Weeks both have extensive experience in systems and network administration, and share a passion for making wireless more broadly available. The authors include detailed coverage for important new changes in specifications and in hardware and software, and they delve deep into cellular and Bluetooth technologies.Whether you need your wireless network to extend to the edge of your desk, fit into your backpack, or cross county lines, the proven techniques in Wireless Hacks will show you how to get the coverage and functionality you're looking for.

Algorithms in a Nutshell: A Practical Guide

by George T. Heineman Gary Pollice Stanley Selkow

Creating robust software requires the use of efficient algorithms, but programmers seldom think about them until a problem occurs. This updated edition of Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your needs—with just enough math to let you understand and analyze algorithm performance.With its focus on application, rather than theory, this book provides efficient code solutions in several programming languages that you can easily adapt to a specific project. Each major algorithm is presented in the style of a design pattern that includes information to help you understand why and when the algorithm is appropriate.With this book, you will:Solve a particular coding problem or improve on the performance of an existing solutionQuickly locate algorithms that relate to the problems you want to solve, and determine why a particular algorithm is the right one to useGet algorithmic solutions in C, C++, Java, and Ruby with implementation tipsLearn the expected performance of an algorithm, and the conditions it needs to perform at its bestDiscover the impact that similar design decisions have on different algorithmsLearn advanced data structures to improve the efficiency of algorithms

Mac OS X: The Missing Manual (Missing Manual)

by David Pogue

You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time.With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention.Mac OS X: The Missing Manual, Tiger Edition is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser. And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands. There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.

Programming JavaScript Applications: Robust Web Architecture with Node, HTML5, and Modern JS Libraries

by Eric Elliott

Take advantage of JavaScript’s power to build robust web-scale or enterprise applications that are easy to extend and maintain. By applying the design patterns outlined in this practical book, experienced JavaScript developers will learn how to write flexible and resilient code that’s easier—yes, easier—to work with as your code base grows.JavaScript may be the most essential web programming language, but in the real world, JavaScript applications often break when you make changes. With this book, author Eric Elliott shows you how to add client- and server-side features to a large JavaScript application without negatively affecting the rest of your code.Examine the anatomy of a large-scale JavaScript applicationBuild modern web apps with the capabilities of desktop applicationsLearn best practices for code organization, modularity, and reuseSeparate your application into different layers of responsibilityBuild efficient, self-describing hypermedia APIs with Node.jsTest, integrate, and deploy software updates in rapid cyclesControl resource access with user authentication and authorizationExpand your application’s reach through internationalization

PHP & MySQL: The Missing Manual, Second Edition

by Brett McLaughlin

If you can build websites with CSS and JavaScript, this book takes you to the next level—creating dynamic, database-driven websites with PHP and MySQL. Learn how to build a database, manage your content, and interact with users. With step-by-step tutorials, this completely revised edition gets you started with expanded coverage of the basics and takes you deeper into the world of server-side programming.The important stuff you need to know:Get up to speed quickly. Learn how to install PHP and MySQL, and get them running on both your computer and a remote server.Gain new techniques. Take advantage of the all-new chapter on integrating PHP with HTML web pages.Manage your content. Use the file system to access user data, including images and other binary files.Make it dynamic. Create pages that change with each new viewing.Build a good database. Use MySQL to store user information and other data.Keep your site working. Master the tools for fixing things that go wrong.Control operations. Create an administrative interface to oversee your site.

Developing with Google+: Practical Guide to the Google+ Platform

by Jennifer Murphy

Would you like to integrate Google+ with an existing website, or build your own social application on the platform? Developing with Google+ takes you on a tour of the Google+ APIs, with lots of concrete examples and hands-on projects. You’ll learn how to take advantage of Google+ social plug-ins, communicate programmatically with Google+ over REST APIs, and author real-time Hangout Apps.Over the course of this book, you’ll follow the progress of a fictional company, Baking Disasters, as it incorporates all the features of the Google+ platform.Make the most of social widgets such as the +1 button, Badge, and the Share buttonUse performance tuning techniques to speed up social plugins on your siteCreate your own plugins by accessing public data APIs with RESTful web servicesTransform an blog into a social web application through server-side processingUse OAuth to authenticate users and authorize your access to their private dataExtend Google+ Hangouts programmatically and create your own application

Baragwanath Hospital, Soweto: A history of medical care 1941–1990

by null Simonne Horwitz

Baragwanath Hospital, Soweto illustrates how this rapidly growing, underfunded but surprisingly effective institution found the niche that allowed it to exist, to provide medical care to a massive patient body and at times even to flourish in the apartheid state. The book offers new ways of exploring the history of apartheid, apartheid medicine and health care. The long history of Chris Hani Baragwanath Hospital (its full current name) or Bara, as it’s popularly known, has been shaped by a complex set of conditions. Established in the early 1940s, Bara stands on land purchased by the Cornish immigrant John Albert Baragwanath in the late nineteenth century. He set up a refreshment post, trading store and hotel on the site – in what is now Soweto – which was a one day journey by ox-wagon from Johannesburg. The hotel became affectionately known as ‘Baragwanath Place’ (the surname is Welsh, from ‘bara’ meaning ‘bread’ and ‘gwenith’ meaning’ wheat’). The land was then bought by Corner House Mining Group and later taken over by Crown Mines Ltd. but was never mined. The British government bought the land in the early 1940s to build a military hospital but by 1947, Baragwanath ceased to operate as a military hospital and under the auspices of the Transvaal Provincial Administration a civilian hospital was opened with 480 beds. Patients were transferred from the ‘non-European’ wing of the Johannesburg General Hospital in the ‘white’ area of Johannesburg. Links were immediately forged with the University of the Witwatersrand and Bara would over time become one of its largest teaching centres. This link brought medical students and their teachers into direct contact with apartheid in the medical sphere. This book will contribute to studies of the history of apartheid that have begun to provide a more nuanced account of its workings. The history of Baragwanath and of the doctors and nurses who worked there tells us much about apartheid ideology and practice, as well as resistance to it, in the realm of health care.

Refine Search

Showing 1,626 through 1,650 of 100,000 results