Unix for Oracle DBAs Pocket ReferenceIf you are an Oracle DBA moving to Unix from another environment such as Windows NT or IBM Mainframe, you know that the commands you need to learn are far different from those covered in most beginning Unix books. In this handy pocket-sized book, Don Burleson introduces those Unix commands that you as an Oracle DBA most need to know. ...
Understanding MySQL InternalsAlthough MySQL's source code is open in the sense of being publicly available, it's essentially closed to you if you don't understand it. This book provides a comprehensive tour of MySQL 5 that shows you how to figure out the inner-workings of this powerful database. You'll learn how data structures and convenience functions operate, how to add new storage engines and configuration options, and much more. ...
UML 2.0 in a NutshellThis comprehensive guide has been fully revised to cover UML 2.0, today's standard method for modeling software systems. Packed with concise information, it's been crafted to help IT professionals read, create, and understand system artifacts expressed using UML. Also includes an example-rich tutorial for those who need familiarizing with the system. ...
Ubuntu HacksLike all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips on getting the most out of the free applications packaged with the Ubuntu Linux distribution, while intermediate and advanced readers will learn the ins-and-outs of power management, wireless roaming, 3D video acceleration, server configuration, and much more. ...
The Ruby Programming LanguageBestselling author David Flanagan teams up with Ruby creator Yukihiro "Matz" Matsumoto and writer/cartoonist/programmer why the lucky stiff to bring you the authoritative guide to Ruby. Covering versions 1.9 and 1.8, this book helps you learn Ruby's lexical structure, primary expressions, conditionals, syntax, classes, the data it manipulates, and more. For experienced programmers who want to look at this language in depth, this guide is invaluable. ...
The Myths of SecurityIf you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online. ...
The Geek AtlasWith this unique traveler's guide, you'll learn about 128 destinations around the world where discoveries in science, mathematics, or technology occurred or is happening now. Travel to Munich to see the world's largest science museum, watch Foucault's pendulum swinging in Paris, ponder a descendant of Newton's apple tree at Trinity College, Cambridge, and more. Each site in The Geek Atlas focuses on discoveries or inventions, and includes information about the people and the science behind them. ...
The Facebook Marketing BookHow can Facebook help you promote your brand, products, and services? This book provides proven tactics that you can use right away to build your brand and engage prospective customers. Whether you're a marketing and PR professional, an entrepreneur, or a small business owner, you'll learn about the tools and features that will help you reach specific Facebook audiences. You'll also get an in-depth overview, with colorful and easy-to-understand introductions to Profiles, Groups, Pages, Applications, Ads, Events, and Facebook etiquette. ...
Python for Unix and Linux System AdministrationPython is an ideal language for solving problems, especially for Linux and Unix. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient way to handle them. Once you finish this book, you'll be able to develop your own set of command-line utilities with Python to tackle a wide range of problems. ...
Security Power ToolsWhat if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. ...