
Preface
|
xxxv
The thermometer icons, found next to each hack, indicate the relative
complexity of the hack:
Whenever possible, the hacks in this book are not platform-specific, which
means you can use them on Linux, Macintosh, and Windows machines.
However, some things are possible only on a particular platform.
Using Code Examples
This book is here to help you get your job done. In general, you may use the
code in this book in your programs and documentation. You do not need to
contact us for permission unless you’re reproducing a significant portion of
the code. For example, writing a program that uses several chunks of code
from this book does not require permission. Selling or distributing a CD-
ROM of examples from O’Reilly books does require permission. Answering
a question by citing this book and quoting example code does not require
permission. Incorporating a significant amount of example code from this
book into your product’s documentation does require permission.
We appreciate, but do not require, attribution. An attribution usually
includes the title, author, publisher, and ISBN. For example: “Mapping
Hacks by Schuyler Erle, Rich Gibson, and Jo Walsh. Copyright 2005
O’Reilly Media, Inc., 0-596-00703-5.”
If you feel your use of code examples falls outside fair use or the permission
given above, feel free to contact us at permissions@oreilly.com.
Color Images Available Online
To bring you ...