Two Bits


Book Description

In Two Bits, Christopher M. Kelty investigates the history and cultural significance of Free Software, revealing the people and practices that have transformed not only software but also music, film, science, and education. Free Software is a set of practices devoted to the collaborative creation of software source code that is made openly and freely available through an unconventional use of copyright law. Kelty explains how these specific practices have reoriented the relations of power around the creation, dissemination, and authorization of all kinds of knowledge. He also makes an important contribution to discussions of public spheres and social imaginaries by demonstrating how Free Software is a “recursive public”—a public organized around the ability to build, modify, and maintain the very infrastructure that gives it life in the first place. Drawing on ethnographic research that took him from an Internet healthcare start-up company in Boston to media labs in Berlin to young entrepreneurs in Bangalore, Kelty describes the technologies and the moral vision that bind together hackers, geeks, lawyers, and other Free Software advocates. In each case, he shows how their practices and way of life include not only the sharing of software source code but also ways of conceptualizing openness, writing copyright licenses, coordinating collaboration, and proselytizing. By exploring in detail how these practices came together as the Free Software movement from the 1970s to the 1990s, Kelty also considers how it is possible to understand the new movements emerging from Free Software: projects such as Creative Commons, a nonprofit organization that creates copyright licenses, and Connexions, a project to create an online scholarly textbook commons.




The Art of UNIX Programming


Book Description

The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.




Electronic Communication Across the Curriculum


Book Description

This collection of 24 essays explores what happens when proponents of writing across the curriculum (WAC) use the latest computer-mediated tools and techniques--including e-mail, asynchronous learning networks, MOOs, and the World Wide Web--to expand and enrich their teaching practices, especially the teaching of writing. Essays and their authors are: (1) "Using Computers to Expand the Role of Writing Centers" (Muriel Harris); (2) "Writing across the Curriculum Encounters Asynchronous Learning Networks" (Gail E. Hawisher and Michael A. Pemberton); (3) "Building a Writing-Intensive Multimedia Curriculum" (Mary E. Hocks and Daniele Bascelli); (4) "Communication across the Curriculum and Institutional Culture" (Mike Palmquist; Kate Kiefer; Donald E. Zimmerman); (5) "Creating a Community of Teachers and Tutors" (Joe Essid and Dona J. Hickey); (6) "From Case to Virtual Case: A Journey in Experiential Learning" (Peter M. Saunders); (7) "Composing Human-Computer Interfaces across the Curriculum in Engineering Schools" (Stuart A. Selber and Bill Karis); (8) "InterQuest: Designing a Communication-Intensive Web-Based Course" (Scott A. Chadwick and Jon Dorbolo); (9) "Teacher Training: A Blueprint for Action Using the World Wide Web" (Todd Taylor); (10) "Accommodation and Resistance on (the Color) Line: Black Writers Meet White Artists on the Internet" (Teresa M. Redd); (11) "International E-mail Debate" (Linda K. Shamoon); (12) "E-mail in an Interdisciplinary Context" (Dennis A. Lynch); (13) "Creativity, Collaboration, and Computers" (Margaret Portillo and Gail Summerskill Cummins); (14) "COllaboratory: MOOs, Museums, and Mentors" (Margit Misangyi Watts and Michael Bertsch); (15) "Weaving Guilford's Web" (Michael B. Strickland and Robert M. Whitnell); (16) "Pig Tales: Literature inside the Pen of Electronic Writing" (Katherine M. Fischer); (17) "E-Journals: Writing to Learn in the Literature Classroom" (Paula Gillespie); (18) "E-mailing Biology: Facing the Biochallenge" (Deborah M. Langsam and Kathleen Blake Yancey); (19) "Computer-Supported Collaboration in an Accounting Class" (Carol F. Venable and Gretchen N. Vik); (20) "Electronic Tools to Redesign a Marketing Course" (Randall S. Hansen); (21) Network Discussions for Teaching Western Civilization" (Maryanne Felter and Daniel F. Schultz); (22) "Math Learning through Electronic Journaling" (Robert Wolfe); (23) "Electronic Communities in Philosophy Classrooms" (Gary L. Hardcastle and Valerie Gray Hardcastle); and (24) "Electronic Conferencing in an Interdisciplinary Humanities Course" (Mary Ann Krajnik Crawford; Kathleen Geissler; M. Rini Hughes; Jeffrey Miller). A glossary and an index are included. (NKA)




Adobe Illustrator 9.0


Book Description

Learn how to create professional-quality artwork for print or the Web using Illustrator 9, the world's most popular illustration application Updated edition of the worldwide bestseller Adobe Illustrator is one of the most popular vector graphics tools in the print and web industry Self-paced lessons are the ideal introduction to Illustrator's complex features "Adobe Illustrator 9.0 Classroom in a Book" shows users how to master Adobe Illustrator in short, focused lessons. Created by Adobe's own training experts, it covers all the new features of Illustrator 9, including added compatibility with Macromedia Flash, a new Transparency Palette, and superior vector and raster graphics. Readers start with an introduction to Illustrator's many tools, brushes, and palettes. Lessons include making selections, painting, gradient fills, drawing straight lines, using type and creating type masks, outlining paths with patterns, printing artwork, producing color separations, and preparing finished artwork for print or the Web. Each lesson builds upon the knowledge learned in previous lessons, so readers have a full tour of the software by the time they have finished the book. The cross-platform CD provides all the lessons and images needed for each chapter. Previous Edition ISBN: 1-56830-470-6 The Adobe Creative Team is made up of members of Adobe's User Education Group. They take their expertise in training users to work with Adobe products, combine it with the creative talents of the Adobe Illustrator team, and add the valuable content of the CD-ROM to make a unique learning package from Adobe Systems.




American Automobile Names


Book Description




Database Systems


Book Description

Database Systems: A Pragmatic Approach is a classroom textbook for use by students who are learning about relational databases, and the professors who teach them. It discusses the database as an essential component of a software system, as well as a valuable, mission critical corporate resource. The book is based on lecture notes that have been tested and proven over several years, with outstanding results. It also exemplifies mastery of the technique of combining and balancing theory with practice, to give students their best chance at success. Upholding his aim for brevity, comprehensive coverage, and relevance, author Elvis C. Foster's practical and methodical discussion style gets straight to the salient issues, and avoids unnecessary fluff as well as an overkill of theoretical calculations. The book discusses concepts, principles, design, implementation, and management issues of databases. Each chapter is organized systematically into brief, reader-friendly sections, with itemization of the important points to be remembered. It adopts a methodical and pragmatic approach to solving database systems problems. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally, the book includes a number of Foster's original methodologies that add clarity and creativity to the database modeling and design experience while making a novel contribution to the discipline. Everything combines to make Database Systems: A Pragmatic Approach an excellent textbook for students, and an excellent resource on theory for the practitioner.




Google Hacking for Penetration Testers


Book Description

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.




Linux in a Nutshell


Book Description

Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and the desktop--including new desktop environments--have proved to be viable, stable, and readily accessible to even those who don't consider themselves computer gurus. Whether you're using Linux for personal software projects, for a small office or home office (often termed the SOHO environment), to provide services to a small group of colleagues, or to administer a site responsible for millions of email and web connections each day, you need quick access to information on a wide range of tools. This book covers all aspects of administering and making effective use of Linux systems. Among its topics are booting, package management, and revision control. But foremost in Linux in a Nutshell are the utilities and commands that make Linux one of the most powerful and flexible systems available. Now in its fifth edition, Linux in a Nutshell brings users up-to-date with the current state of Linux. Considered by many to be the most complete and authoritative command reference for Linux available, the book covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. Comprehensive but concise, the fifth edition has been updated to cover new features of major Linux distributions. Configuration information for the rapidly growing commercial network services and community update services is one of the subjects covered for the first time. But that's just the beginning. The book covers editors, shells, and LILO and GRUB boot options. There's also coverage of Apache, Samba, Postfix, sendmail, CVS, Subversion, Emacs, vi, sed, gawk, and much more. Everything that system administrators, developers, and power users need to know about Linux is referenced here, and they will turn to this book again and again.




Engineering Your Future


Book Description

Engineering Your Future is an authoritative guide to the academic expectations and professional opportunities in engineering, a field that is both academically rigorous and creatively demanding. Today's engineering students are faced with endless career opportunities. This text clarifies thoseoptions and directs students down the path to a rewarding career in the engineering field.This concise and inexpensive version of the comprehensive edition contains the eleven most popular chapters from its parent text, offering the best option for instructors looking for a solid base from which to work while they incorporate outside projects or assignments.




Business Driven Information Systems


Book Description

"The Baltzan and Phillips approach in Business Driven Information Systems discusses various business initiatives first and how technology supports those initiatives second. The premise for this unique approach is that business initiatives drive technology choices in a corporation. Therefore, every discussion addresses the business needs first and addresses the technology that supports those needs second. This approach takes the difficult and often intangible MIS concepts, brings them down to the student's level, and applies them using a hands-on approach to reinforce the concepts. BDIS provides the foundation that will enable students to achieve excellence in business, whether they major in operations management, manufacturing, sales, marketing, etc. BDIS is designed to give students the ability to understand how information technology can be a point of strength in an organization."--Publisher's website.