A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Carries EU Toy Safety Directive 'Unsuitable for children ages. 0-3' warning logo. NA Previous edition: 2013 Includes bibliographical references. View More...
A crisp clean softcover, no markings throughout: A current and complete introduction to UNIX. This new edition provides complete up-to-date coverage of UNIX, including basic concepts, popular utilities, shells, networking, systems programming, internals, and system administration. A must for anyone who uses UNIX. View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Updated to reflect the new features of Stata 11, A Gentle Introduction to S tata, Third Edition continues to help new Stata users become proficient in Stata. After reading this introductory text, you will be able to enter, bui ld, and manage a data set as well as perform fundamental statistical analys es. New to the Third Edition A new chapter on the analysis of missing data and the use of multiple-imput ation methods Extensive revision of the chapter... View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. View More...
A crisp clean softcover, no markings throughout: The book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory on a daily basis--including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along wit... View More...
For the 250,000 users of Adobe Illustrator, this guide details the process by which illustrators solve the technical and conceptual problems of their trade. Case studies reveal the capabilities of different sets of Illustrato r tools and techniques; each study "illuminates" a special aspect of the pr ogram and teaches how Illustrator can be used with other programs. View More...
Aimed at those with some previous programming experience, Inside C# shows d evelopers the unique strengths, advantages, and tips for coding with C#. Th is fast-paced and in-depth tutorial will let you use Microsoft's newest pro gramming language on the emerging .NET platform successfully. The outstanding strength of this text is its in-depth language tutorial on C#, with complete coverage of basic and advanced object-oriented programmin g techniques. New language features like properties, indexers, and attribut es get full coverage, alongside the basics of using classes and inheritance . The b... View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Part of The Java Series, The Java Programming Language is the definitive technical guide to the Java language. Ken Arnold and James Gosling explain Java's design motivations and tradeoffs, while presenting a wealth of practical examples. (Communications/Networking). View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Learn from Compaq's own Active Directory experts techniques and best p ractices for creating a secure and scalable network foundation for Windows 2000 and Exchange 2000. Mission-Critical Active Directory provides systems designers and administra tors within growing and large organizations with techniques and insights in to Active Directory. Using this information, they can build a Windows 2000 network that reliably accommodates many thousands of ... View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Learn CMake through a series of task-based recipes that provide practical, simple, and ready-to-use CMake solutions for your code Key Features Configure, build, and package software written in C, C++, and Fortran Progress from simple to advanced tasks with examples tested on Linux, macOS , and Windows Manage code complexity and library dependencies with reusable CMake building blocks. View More...
In excellent condition. Pages are intact and not marred by notes or highlig hting. The spine remains undamaged. What does the world want? According to John Battelle, a company that answer s that question -- in all its shades of meaning -- can unlock the most intr actable riddles of both business and culture. And for the past few years, t hat's exactly what Google has been doing. Jumping into the game long after Yahoo, Alta Vista, Excite, Lycos, and othe r pioneers, Google offered a radical new approach to search, redefined the idea of viral marketing, survived the dotcom crash, and pulled off ... View More...
A crisp clean softcover, no markings throughout: From the creator of the popular open source projects AutoRpm and LogWatch c omes a thorough and entertaining book. -- About the Author Kirk Bauer has been involved in computer programming since 1985. He has bee n using and administering UNIX systems since 1994. Although his personal fa vorite UNIX variant is Linux, he has administered and developed on everythi ng from FreeBSD to Solaris, AIX, and HP-UX. He is the author of various ope n source solutions, such as Logwatch. Kirk has been involved with software development and system/network admini... View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. "Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes." -Erich Gamma, IBM Distinguished Engineer "Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to underst... View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. This concise book offers 'four steps to control an IT environment' that can be mapped 'to any maturity model'. From the table of contents: ITIL processes common to the High Performers; Creat a change request tracking system; The Spectrum of Change; Helpful tips when preparing for an audit; Generate the DSL approval process; Metrics and how to use them. View More...
A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. THE TOTAL RECALL REVOLUTION IS INEVITABLE. IT WILL CHANGE WHAT IT MEANS TO BE HUMAN. IT HAS ALREADY BEGUN. What if you could remember everything? Gordon Bell and Jim Gemmell draw on their experience from their MyLifeBits project at Microsoft Research to exp lain the benefits to come from an earth-shaking and inevitable increase in electronic memories. In 1998 they began using Bell, a luminary in the compu ter world, as a test case, attempting to digit... View More...
This book helps you learn and optimize the Netscape LiveWire suite to make the job of Web site administration easier and less time-consuming. View More...
A tight clean copy, no markings throughout: In the fast-paced, caffeine-powered, and sometimes reckless world of computer security, the security analogy of a "hard crunchy outside and soft chewy inside," a staple of the security community today, is uncannily apropos as we spend millions to protect and fortify the outside perimeter network and nary spend a dime to address internal threats. However, as convenient as it may be to leave internal systems free from controls, it's a disaster once someone "bites" through to that unprotected inside; consider, too, the potential damage (whether intentio... View More...
Get connected, get clicking, and get what you need from the Internet, wheth er that's answers from Google, bargains from E-bay, music from iTunes, or m erchandise from the thousands of shopping sites. The Internet Gigabook For Dummies has almost 900 pages jam-packed with information, how-tos, tips, te chniques, advice, and short-cuts to help you use the Internet for all it's worth! Whether you're an experienced Web surfer or just daring to get your feet wet for the first time, you'll discover how to get the most from the I nternet and its most popular sites with information on: The basics-ever... View More...