Marknadens största urval
Snabb leverans

Böcker utgivna av O'Reilly Media

Filter
Filter
Sortera efterSortera Populära
  • - The Continuing Evolution
    av Danese Cooper, Mark Stone & Chris Dibona
    507

    Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sources: Voices from the Revolution .These essays explore open source's impact on the software industry and reveal how open source concepts are infiltrating other areas of commerce and society. The essays appeal to a broad audience: the software developer will find thoughtful reflections on practices and methodology from leading open source developers like Jeremy Allison and Ben Laurie, while the business executive will find analyses of business strategies from the likes of Sleepycat co-founder and CEO Michael Olson and Open Source Business Conference founder Matt Asay.From China, Europe, India, and Brazil we get essays that describe the developing world's efforts to join the technology forefront and use open source to take control of its high tech destiny. For anyone with a strong interest in technology trends, these essays are a must-read.The enduring significance of open source goes well beyond high technology, however. At the heart of the new paradigm is network-enabled distributed collaboration: the growing impact of this model on all forms of online collaboration is fundamentally challenging our modern notion of community.What does the future hold? Veteran open source commentators Tim O'Reilly and Doc Searls offer their perspectives, as do leading open source scholars Steven Weber and Sonali Shah. Andrew Hessel traces the migration of open source ideas from computer technology to biotechnology, and Wikipedia co-founder Larry Sanger and Slashdot co-founder Jeff Bates provide frontline views of functioning, flourishing online collaborative communities.The power of collaboration, enabled by the internet and open source software, is changing the world in ways we can only begin to imagine.Open Sources 2.0 further develops the evolutionary picture that emerged in the original Open Sources and expounds on the transformative open source philosophy."e;This is a wonderful collection of thoughts and examples bygreat minds from the free software movement, and is a must have foranyone who follows free software development and project histories."e;--Robin Monks, Free Software MagazineThe list of contributors includeAlolita SharmaAndrew HesselBen LaurieBoon-Lock YeoBruno SouzaChris DiBonaDanese CooperDoc SearlsEugene KimGregorio RoblesIan MurdockJeff BatesJeremy AllisonJesus M. Gonzalez-BarahonaKim PoleseLarry SangerLouisa LiuMark StoneMark StoneMatthew N. AsayMichael OlsonMitchell BakerPamela JonesRobert AdkinsRuss NelsonSonali K. ShahStephen R. WalliSteven WeberSunil SaxenaTim O'ReillyWendy Seltzer

  • - Building and Maintaining Problem-Free Windows Networks
    av Roberta Bragg & Craig Hunt
    677

    This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and configure the services based on these protocols. Any skilled network administrator knows that understanding how things work is as important as knowing how things are done. This book is the essential guide to both, containing everything a network administrator needs to exchange information via the Internet, and to build effective reliable networks.This must-read guide is divided into three distinct sections: fundamental concepts, tutorial, and reference. The first three chapters are a basic discussion of the network protocols and services. This discussion provides the fundamental concepts necessary to understand the rest of the book. The remaining chapters provide a how-to tutorial for planning, installing and configuring various important network services. The book concludes with three appendixes that are technical references for various configuration options. Content specifics include how to:Install, configure, and manage a Microsoft DNS and Windows DHCP serverControl remote communications with Microsoft RRAS softwareProtect hosts with Internet Connection FirewallsConfigure Internet and Intranet Web services with IISDesign proper security into your networkTroubleshoot the network when problems developAfter you've turned the final page of Windows Server 2003 Network Administration, you'll not only understand how to network, but also why it needs to be done.

  • - Writing, Hacking, and Modifying Security Tools
    av Nitesh Dhanjani & Justin Clarke
    491

    If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include:Writing your own network sniffers and packet injection toolsWriting plugins for Nessus, Ettercap, and NiktoDeveloping exploits for MetasploitCode analysis for web applicationsWriting kernel modules for security applications, and understanding rootkitsWhile many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.

  • av Edd Wilder-James
    417

    This lab-style guide works through nearly 50 mini-projects that introduce the Mono 1.0 release. It teaches how to acquire, install, and run Mono on Linux, Windows, or Mac OS X and work with the various Mono components - from the CLR to the Mono C.

  • av David Kreines
    161

    Providing the information Oracle DBAs need to keep databases operating at peak performance, this title describes each initialization parameter, including category and whether it can be modified dynamically via the ALTER SESSION or ALTER SYSTEM command. You'll also find performance tips and optimal settings for different configurations.

  • av Matthias Kalle Dalheimer & Matt Welsh
    677

    You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom addressed in other books.This fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics suchas audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular.Running Linux covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration--including dial-up, ADSL, and cable modems--in case you need to set up your network manually. The book canmake you proficient on office suites and personal productivity applications--and also tells you what programming tools are available if you're interested in contributing to these applications.Other new topics in the fifth edition include encrypted email and filesystems, advanced shell techniques, and remote login applications. Classic discussions on booting, package management, kernel recompilation, and X configuration have also been updated.The authors of Running Linux have anticipated problem areas, selected stable and popular solutions, and provided clear instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users, while still providing the additional information experienced users will need to progress in their mastery of Linux.Whether you're using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.

  • - 100 Industrial-Strength Tips & Tools
    av Dave Burchell, Dave Nielsen & Shannon Sofield
    361

    If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely.But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service.The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers.With PayPal Hacks, you can:Learn extra steps to help protect yourself while buying or selling on eBaySave time and money with advanced tips and undocumented featuresLearn dozens of easy-to-follow procedures to help you request and receive payments and fill ordersUse PayPal to handle subscriptions, affiliate systems, and donationsCreate and customize your customers' checkout processEffortlessly integrate PayPal's shopping cart system into your own websiteImplement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT)Develop and distribute ecommerce applications with the PayPal APIEach hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to make PayPal more profitable, more flexible, and more convenient.

  • av Allison Randal
    547

    This look at Perl 6 uncovers developments in Parrot - the interpreter engine that will execute code written in the new Perl 6 language and the most revolutionary change in the language itself - Apocalypse 12 on objects.

  • - Tips & Tools for Electronic Cartography
    av Jo Walsh, Rich Gibson & Schuyler Erle
    431

    Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?Well, they shouldn't. The reality is that map creation, or "e;cartography,"e; has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the ordinary PC user.Mapping Hacks, the latest page-turner from O'Reilly Press, tackles this notion head on. It's a collection of one hundred simple--and mostly free--techniques available to developers and power users who want draw digital maps or otherwise visualize geographic data. Authors Schuyler Erle, Rich Gibson, and Jo Walsh do more than just illuminate the basic concepts of location and cartography, they walk you through the process one step at a time.Mapping Hacks shows you where to find the best sources of geographic data, and then how to integrate that data into your own map. But that's just an appetizer. This comprehensive resource also shows you how to interpret and manipulate unwieldy cartography data, as well as how to incorporate personal photo galleries into your maps. It even provides practical uses for GPS (Global Positioning System) devices--those touch-of-a-button street maps integrated into cars and mobile phones. Just imagine: If Captain Kidd had this technology, we'd all know where to find his buried treasure!With all of these industrial-strength tips and tools, Mapping Hacks effectively takes the sting out of the digital mapmaking and navigational process. Now you can create your own maps for business, pleasure, or entertainment--without ever having to sharpen a single pencil.

  • av Jim Elliott
    361

    This guide walks the reader through the ins and outs of using Hibernate, from installation and configuration, to complex associations and composite types.

  • av Walter Glenn
    161

    Updated for Word 2003, this guide covers keyboard shortcuts, user interface, commands and tasks. It explains how to accomplish specific tasks, such as formatting, spelling, editing, printing, customizing. It provides reference tables for quick lookup of keyboard shortcuts, regular expressions and common file locations.

  • - 100 Industrial-Strength Tips & Tools
    av Bonnie Biafore
    377

    For the geek who's an investor, and the investor who's a geek, we present Online Investing Hacks, 100 industrial-strength, bleeding edge tips, tools and techniques for analyzing and managing online portfolios.Individual investors have become more computer-literate and technology-dependent than ever before. Whether you're looking for suitable investments, studying alternatives, or managing your portfolios, you need data. The Internet can be a goldmine of financial data and research, but today's online investors also use spreadsheets, databases, and financial applications to select, study and manage investments. If your proficiency has grown to the point where you crave industrial-strength tips and tools to turbo-charge your efforts, this is the book for you.Online Investing Hacks covers:Screening InvestmentsCollecting DataFundamental AnalysisTechnical AnalysisExecuting TradesInvesting in Mutual FundsPortfolio ManagementUpdating Stock DataFinancial PlanningOther books for managing online investing are either out of date, are for beginners and don't go beyond the most basic advice, or are so dull and boring they squeeze that last bit of fun out of the topic. Online Investing Hacks is for the customer who wants to know the latest techniques, to go beyond the basics, who gets jazzed by cool online tools and services, and who actually wants to have a bit of fun while trying to strike it rich (or at least not lose their shirt).

  • av Kerry J. Cox
    547

    This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them.

  • av Sham Bhangal
    361

    This collection offers expert Flash tips and tricks for optimization, creating interesting effects, ActionScript programming, sound and video effects, and much more - and you don't need to be an expert to use them (although you'll certainly look like one).

  • av Michael McMillan
    547

    As an experienced JavaScript developer moving to server-side programming, you need to implement classic data structures and algorithms associated with conventional object-oriented languages like C# and Java. This practical guide shows you how to work hands-on with a variety of storage mechanismsincluding linked lists, stacks, queues, and graphswithin the constraints of the JavaScript environment.Determine which data structures and algorithms are most appropriate for the problems youre trying to solve, and understand the tradeoffs when using them in a JavaScript program. An overview of the JavaScript features used throughout the book is also included.This book covers:Arrays and lists: the most common data structuresStacks and queues: more complex list-like data structuresLinked lists: how they overcome the shortcomings of arraysDictionaries: storing data as key-value pairsHashing: good for quick insertion and retrievalSets: useful for storing unique elements that appear only onceBinary Trees: storing data in a hierarchical mannerGraphs and graph algorithms: ideal for modeling networksAlgorithms: including those that help you sort or search dataAdvanced algorithms: dynamic programming and greedy algorithms

  • - A Complete Guide to Wireless Configuration
    av Edd Wilder-James, Roger Weeks & Brian Jepson
    361

    In Linux Unwired, you'll learn the basics of wireless computing, from the reasons why you'd want to go wireless in the first place, to setting up your wireless network or accessing wireless data services on the road. The book provides a complete introduction to all the wireless technologies supported by Linux. You'll learn how to install and configure a variety of wireless technologies to fit different scenarios, including an office or home network and for use on the road. You'll also learn how to get Wi-Fi running on a laptop, how to use Linux to create your own access point, and how to deal with cellular networks, Bluetooth, and Infrared.Other topics covered in the book include:Connecting to wireless hotspotsCellular data plans you can use with LinuxWireless security, including WPA and 802.1xFinding and mapping Wi-Fi networks with kismet and gpsdConnecting Linux to your Palm or Pocket PCSending text messages and faxes from Linux through your cellular phoneLinux Unwired is a one-stop wireless information source for on-the-go Linux users. Whether you're considering Wi-Fi as a supplement or alternative to cable and DSL, using Bluetooth to network devices in your home or office, or want to use cellular data plans for access to data nearly everywhere, this book will show you the full-spectrum view of wireless capabilities of Linux, and how to take advantage of them.

  • av Dan Tow
    391

    A poorly performing database application not only costs users time, but also has an impact on other applications running on the same computer or the same network. SQL Tuning provides an essential next step for SQL developers and database administrators who want to extend their SQL tuning expertise and get the most from their database applications.There are two basic issues to focus on when tuning SQL: how to find and interpret the execution plan of an SQL statement and how to change SQL to get a specific alternate execution plan. SQL Tuning provides answers to these questions and addresses a third issue that's even more important: how to find the optimal execution plan for the query to use.Author Dan Tow outlines a timesaving method he's developed for finding the optimum execution plan--rapidly and systematically--regardless of the complexity of the SQL or the database platform being used. You'll learn how to understand and control SQL execution plans and how to diagram SQL queries to deduce the best execution plan for a query. Key chapters in the book include exercises to reinforce the concepts you've learned. SQL Tuning concludes by addressing special concerns and unique solutions to "e;unsolvable problems."e;Whether you are a programmer who develops SQL-based applications or a database administrator or other who troubleshoots poorly tuned applications, SQL Tuning will arm you with a reliable and deterministic method for tuning your SQL queries to gain optimal performance.

  • av Kathy Sierra
    621

    Topics covered in this text include: component-based and role-based development; the architecture of EJB, distributed programming with RMI; developing and deploying an EJB application; the client view of a session and entity bean; and the session bean lifecycle and component contract.

  • av Robert Simmons
    547

    Focusing on the little-touched but critical parts of the Java programming language that expert programmers use, this text examines the difficult but extremely powerful and useful programming techniques like reflection, advanced data modelling, advanced GUI design, and advanced aspects of JDO, EJB and XML-based web clients.

  • av Gregor Purdy
    127

    This manual covers core concepts of version control with a complete command reference and configuration and repository setup guide. It explains repository hacking.

  • av Jay Ts
    161

    This text describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons (smbd, nmbd, and winbindd)and the utilities in the Samba distribution.

  • av Evan Lenz
    601

    An exploration of the relationship between XML and Office 2003, examining how the various products in the Office suite both produce and consume XML. Beginning with an overview of the XML features included in the various Office 2003 components, it provides guidance on how to import or export information from Office documents into other systems.

  • av Greg Lehey
    541

    This practical guidebook explains not only how to get a computer up and running with the FreeBSD operating system, but how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access and provide key parts of the Inter

  • av Robert Bruce Thompson
    621

    This text offers information, including how-to advice for specific components, ample reference material, and a comprehensive case study on building a PC. It is intended for anyone who buys, builds, upgrades, or repairs PCs in a corporate, small business, or home setting.

  • av Richard Foley
    161

    A quick and convenient path to mastery of the Perl debugger and its commands. Written by a core member of the Perl debugger development team, it's an ideal quick reference to debugger commands, as well as a detailed tutorial on how to get started. The Perl Debugger Pocket Reference provides complete coverage in a conveniently small package.

  • av Rob Flickenger
    487

    This new edition offers a case for building wireless networks on a local level - they are inexpensive and can be implemented and managed by the community using them. This guide helps readers plan a network, obtain essential components and understand protocols.

  • av William Hamilton
    717

    Useful for IT professionals, this guide introduces the various facets of SQL Server 2005, which is Microsoft's next-generation data management and analysis solution. Explaining its various features, it shows how they can help conquer a variety of data challenges. It also teaches how to reduce the complexity of managing database applications.

  • av Eric Van Der Vlist
    367

    As developers know, the beauty of XML is that it is extensible, even to the point that you can invent new elements and attributes as you write XML documents. Then, however, you need to define your changes so that applications will be able to make sense of them and this is where XML schema languages come into play. RELAX NG (pronounced relaxing), the Regular Language Description for XML Core--New Generation is quickly gaining momentum as an alternative to other schema languages. Designed to solve a variety of common problems raised in the creation and sharing of XML vocabularies, RELAX NG is less complex than The W3C's XML Schema Recommendation and much more powerful and flexible than DTDs.RELAX NG is a grammar-based schema language that's both easy to learn for schema creators and easy to implement for software developers In RELAX NG, developers are introduced to this unique language and will learn a no-nonsense method for creating XML schemas. This book offers a clear-cut explanation of RELAX NG that enables intermediate and advanced XML developers to focus on XML document structures and content rather than battle the intricacies of yet another convoluted standard.RELAX NG covers the following topics in depth:Introduction to RELAX NGBuilding RELAX NG schemas using XML syntaxBuilding RELAX NG schemas using compact syntax, an alternative non-XML syntaxFlattening schemas to limit depth and provide reusabilityUsing external datatype libraries with RELAX NGW3C XML Schema regular expressionsWriting extensible schemasAnnotating schemasGenerating schemas form different sourcesDeterminism and datatype assignmentand much more.If you're looking for a schema language that's easy to use and won't leave you in a labyrinth of obscure limitations, RELAX NG is the language you should be using. And only O'Reilly's RELAX NG gives you the straightforward information and everything else you'll need to take advantage of this powerful and intelligible language.

  • av Rick Greenwald
    737

    The goal of this book is to bring order to the chaos of Oracle information - to pull together the most essential information on Oracle architecture, syntax, and user interfaces. It covers Oracle commands, language constructs, parameters, and file formats in a desktop reference.

  • Spara 18%
    av Shelly Powers
    667

    This new edition is loaded with even more advice about almost every aspect of Unix, covering new technologies that users need to know.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.