The Linux Command Line, 2nd Edition


Book Description

You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: • Create and delete files, directories, and symlinks • Administer your system, including networking, package installation, and process management • Use standard input and output, redirection, and pipelines • Edit files with Vi, the world's most popular text editor • Write shell scripts to automate common or boring tasks • Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust.




Blood Game


Book Description

C.1 GIFT. 11-09-2010. $7.99.




Blood Meridian


Book Description

25th ANNIVERSARY EDITION • From the bestselling author of The Passenger and the Pulitzer Prize–winning novel The Road: an epic novel of the violence and depravity that attended America's westward expansion, brilliantly subverting the conventions of the Western novel and the mythology of the Wild West. Based on historical events that took place on the Texas-Mexico border in the 1850s, Blood Meridian traces the fortunes of the Kid, a fourteen-year-old Tennesseean who stumbles into the nightmarish world where Indians are being murdered and the market for their scalps is thriving. Look for Cormac McCarthy's latest bestselling novels, The Passenger and Stella Maris.




Pro PHP Security


Book Description

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.







Sharkpunk


Book Description

SHARKPUNK: an anthology of killer shark stories. Sharks – the ultimate predators, masters of their watery domain, a world that is entirely alien and inhospitable to man. So many aspects of the shark are associated with humankind’s most primal fears. The tell-tale dorsal fin slicing through the water, the dead eyed-stare, the gaping jaws full to unforgiving teeth, the remorseless drive to kill and feed… Inspired by such classic pulp movies as Jaws and Deep Blue Sea – as well as such ludicrous delights as Sharknado and Mega Shark vs Giant Octopus – the stories contained within are rip-roaring page-turners and slow-build chillers that celebrate all things savage, pulp and selachian. Covering the whole range of speculative fiction genres, from horror and Steampunk, through to SF and WTF, these are stories with bite! Come on in. The water’s fine…




Big Book of Apple Hacks


Book Description

The Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV. With 125 entirely new hacks presented in step-by-step fashion, this practical book is for serious Apple computer and gadget users who really want to take control of these systems. Many of the hacks take you under the hood and show you how to tweak system preferences, alter or add keyboard shortcuts, mount drives and devices, and generally do things with your operating system and gadgets that Apple doesn't expect you to do. - Publisher.




Harness Horse


Book Description




Combating Desertification in Asia, Africa and the Middle East


Book Description

This book is about the ‘how’ of desertification control as opposed to an analysis of the ‘why’ and fills a gap in the desertification-related literature in that it shows what to do in situations ranging from fixing mobile sands to arresting accelerated soil erosion in sloping lands. There are numerous illustrations to show the successful techniques. This compilation demonstrates that desertification and land degradation can be controlled and reversed with existing techniques in such widely varying environments as the Sahel of Africa to Sri Lanka and the Philippines in SE Asia, from mountains in Lesotho to low lands on desert margins in Mongolia. Proven approaches include technical interventions, changes in governance and to the legislative framework and policy reform. The book fills a gap in the desertification-related literature in that it shows what to do in situations ranging from fixing mobile sands to arresting accelerated soil erosion in sloping lands.