$pread


Book Description

“A fascinating collection from a group of courageous women who created the first publication to explore sex work in a compelling and intelligent way.” —Candida Royalle $pread, an Utne Award–winning magazine by and for sex workers, was independently published from 2005 to 2011. This collection features enduring essays about sex work around the world, first-person stories that range from deeply traumatic to totally hilarious, analysis of media and culture, and fantastic illustrations and photos produced just for the magazine. The book also features the previously untold story of $pread and how it has built a wider audience in its posthumous years. What started as a community tool and trade magazine for the sex industry quickly emerged as the essential guide for people curious about sex work, for independent magazine enthusiasts, and for labor and civil rights activists.




Software Optimization for High-performance Computing


Book Description

The hands-on guide to high-performance coding and algorithm optimization. This hands-on guide to software optimization introduces state-of-the-art solutions for every key aspect of software performance - both code-based and algorithm-based. Two leading HP software performance experts offer comparative optimization strategies for RISC and for the new Explicitly Parallel Instruction Computing (EPIC) design used in Intel IA-64 processors. Using many practical examples, they offer specific techniques for: Predicting and measuring performance - and identifying your best optimization opportunities Storage optimization: cache, system memory, virtual memory, and I/0 Parallel processing: distributed-memory and shared-memory (SMP and ccNUMA) Compilers and loop optimization Enhancing parallelism: compiler directives, threads, and message passing Mathematical libraries and algorithms Whether you're a developer, ISV, or technical researcher, if you need to optimize high-performance software on today's leading processors, one book delivers the advanced techniques and code examples you need: Software Optimization for High Performance Computing.







Configuring and Tuning Databases on the Solaris Platform


Book Description

Covers key performance issues related to using leading databases on Sun servers for system administrators and database programmers. This book brings together best-practice guidelines for every aspect of database tuning on Sun servers.







Nessus, Snort, and Ethereal Power Tools


Book Description

Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. - Snort, Nessus, and Ethereal are the three most popular open source security tools in the world - Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters - Companion Web site provides all working code and scripts from the book for download










MTS, Michigan Terminal System


Book Description




HECDSS


Book Description