Beginning Google Maps Applications With PHP And Ajax

Building interactive web-based mapping applications has been a cumbersome affair. This changed when Google released its powerful Maps API. Beginning Google Maps Applications with PHP and Ajax was written to help you take advantage of this technology in your own endeavorswhether you're an enthusiast playing for fun or a professional building for profit. This book covers version 2 of the API, including Google's new Geocoding service.

Authors Jeffrey Sambells, Cameron Turner, and Michael Purvis get rolling with examples that require hardly any code at all, but you'll quickly become acquainted with many facets of the Maps API. They demonstrate powerful methods for simultaneously plotting large data sets, creating your own map overlays, and harvesting and geocoding sets of addresses. You'll see how to set up alternative tile sets and where to access imagery to use for them. The authors even show you how to build your own geocoder from scratch, for those high-volume batch jobs.

As well as providing hands-on examples of real mapping projects, this book supplies a complete reference for the Maps API, along with the relevant aspects of JavaScript, CSS, PHP, and SQL. Visit the authors' website for additional tips and advice.

Red Hat Linux Pocket Administrator

This handy resource offers busy network administrators clear and concise information for daily on-the-job tasks--all in a portable format. Key management tasks are presented in logically organized sections, with special emphasis on system administration. You’ll get details on file, print, application, mail, terminal, streaming media, and remote servers--and much more.

Universal Command Guide: For Operating Systems

This book portends to be a universal command guide, and in all fairness they managed to get a good number of commands in the text. Unfortunately the ones the missed are significant (e.g. UNIX tar, which is universal in UNIX and Linux). I would not recommend this book for someone looking for help in distinguishing the difference in Linux and BSD commands.

While initially quite skeptical of a book attempting to cover such disparate operating systems, the reality is that I have found this volume to be indespensible. Since I work with Red Hat Linux primarily and Solaris (v8) also rather frequently, it’s easy use the UCG to get the syntax differences of those two environments. Sure, I could just scan the man pages — but the already well-worn out copy of my UCG has enough bookmarks and paperclip (and yellow highlights) to make turning to it easier. It has also helped me better understand that there are quite a few ways to perform networking tasks using the Windows command line (as opposed to becoming dependent on the GUI). The charts showing the equivalency of commands across the diverse operating environments is a real time-saver. As a partisan of the O’Reilly books, I’ve come to the general conclusion that the value of a book is inversely proportional to its size. A big, thick book is generally fluff. But, this one is the exception.

CISSP: Certified Information Systems Security Professional Study Guide

IT security skills are in high demand, and the CISSP Study Guide can give you the skills you need to pursue a successful career as an IT security professional. Sponsored by (ICS2), CISSP was selected as one of the "10 Hottest Certifications for 2002" by the leading certification web site, It was developed to validate mastery of an international standard for information security. Topics covered include security architecture, access control systems, cryptography, operations and physical security, law, investigation & ethics. Written by IT security experts with years of real-world security experience, this book provides in-depth coverage of all official exam domains and includes hundreds of challenging review questions, electronic flashcards, and a searchable electronic version of the entire book.