Best of
Technology

2012

The Idea Factory: Bell Labs and the Great Age of American Innovation


Jon Gertner - 2012
    From the transistor to the laser, it s hard to find an aspect of modern life that hasn t been touched by Bell Labs. Why did so many transformative ideas come from Bell Labs? In "The Idea Factory," Jon Gertner traces the origins of some of the twentieth century s most important inventions and delivers a riveting and heretofore untold chapter of American history. At its heart this is a story about the life and work of a small group of brilliant and eccentric men Mervin Kelly, Bill Shockley, Claude Shannon, John Pierce, and Bill Baker who spent their careers at Bell Labs. Their job was to research and develop the future of communications. Small-town boys, childhood hobbyists, oddballs: they give the lie to the idea that Bell Labs was a grim cathedral of top-down command and control.Gertner brings to life the powerful alchemy of the forces at work behind Bell Labs inventions, teasing out the intersections between science, business, and society. He distills the lessons that abide: how to recruit and nurture young talent; how to organize and lead fractious employees; how to find solutions to the most stubbornly vexing problems; how to transform a scientific discovery into a marketable product, then make it even better, cheaper, or both. Today, when the drive to invent has become a mantra, Bell Labs offers us a way to enrich our understanding of the challenges and solutions to technological innovation. Here, after all, was where the foundational ideas on the management of innovation were born. "The Idea Factory" is the story of the origins of modern communications and the beginnings of the information age a deeply human story of extraordinary men who were given extraordinary means time, space, funds, and access to one another and edged the world into a new dimension."

The Nature of Code


Daniel Shiffman - 2012
    Readers will progress from building a basic physics engine to creating intelligent moving objects and complex systems, setting the foundation for further experiments in generative design. Subjects covered include forces, trigonometry, fractals, cellular automata, self-organization, and genetic algorithms. The book's examples are written in Processing, an open-source language and development environment built on top of the Java programming language. On the book's website (http://www.natureofcode.com), the examples run in the browser via Processing's JavaScript mode.

Ruby on Rails Tutorial: Learn Web Development with Rails (Addison-Wesley Professional Ruby Series)


Michael Hartl - 2012
    "Peter Cooper, Editor of" Ruby Inside Using Rails, developers can build web applications of exceptional elegance and power. Although its remarkable capabilities have made Ruby on Rails one of the world s most popular web development frameworks, it can be challenging to learn and use. " Ruby on Rails Tutorial, Second Edition, " is the solution. Best-selling author and leading Rails developer Michael Hartl teaches Rails by guiding you through the development of your own complete sample application using the latest techniques in Rails web development. The updates to this edition include all-new site design using Twitter s Bootstrap; coverage of the new asset pipeline, including Sprockets and Sass; behavior-driven development (BDD) with Capybara and RSpec; better automated testing with Guard and Spork; roll your own authentication with has_secure_password; and an introduction to Gherkin and Cucumber. You ll find integrated tutorials not only for Rails, but also for the essential Ruby, HTML, CSS, JavaScript, and SQL skills you ll need when developing web applications. Hartl explains how each new technique solves a real-world problem, and he demonstrates this with bite-sized code that s simple enough to understand, yet novel enough to be useful. Whatever your previous web development experience, this book will guide you to true Rails mastery. This book will help you Install and set up your Rails development environment Go beyond generated code to truly understand how to build Rails applications from scratch Learn test-driven development (TDD) with RSpec Effectively use the Model-View-Controller (MVC) pattern Structure applications using the REST architecture Build static pages and transform them into dynamic ones Master the Ruby programming skills all Rails developers need Define high-quality site layouts and data models Implement registration and authentication systems, including validation and secure passwords Update, display, and delete users Add social features and microblogging, including an introduction to Ajax Record version changes with Git and share code at GitHub Simplify application deployment with Heroku

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information


Michael Bazzell - 2012
    In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details

Dark Pools: The Rise of Artificially Intelligent Trading Machines and the Looming Threat to Wall Street


Scott Patterson - 2012
    In the beginning was Josh Levine, an idealistic programming genius who dreamed of wresting control of the market from the big exchanges that, again and again, gave the giant institutions an advantage over the little guy. Levine created a computerized trading hub named Island where small traders swapped stocks, and over time his invention morphed into a global electronic stock market that sent trillions in capital through a vast jungle of fiber-optic cables. By then, the market that Levine had sought to fix had turned upside down, birthing secretive exchanges called dark pools and a new species of trading machines that could think, and that seemed, ominously, to be slipping the control of their human masters. Dark Pools is the fascinating story of how global markets have been hijacked by trading robots--many so self-directed that humans can't predict what they'll do next.

Hacking S3crets


Sai Satish - 2012
    Basic Hacking2. email-Hacking3. Google Hacking4. Websites and databases Hacking5. Windows Passwords Cracking in seconds6. Backtrack7. Metasploit8. Wireless Cracking9. Mobile Hacking

Abundance: The Future Is Better Than You Think


Peter H. Diamandis - 2012
    We will soon be able to meet and exceed the basic needs of every man, woman and child on the planet. Abundance for all is within our grasp. This bold, contrarian view, backed up by exhaustive research, introduces our near-term future, where exponentially growing technologies and three other powerful forces are conspiring to better the lives of billions. An antidote to pessimism by tech entrepreneur turned philanthropist, Peter H. Diamandis and award-winning science writer Steven Kotler. Since the dawn of humanity, a privileged few have lived in stark contrast to the hardscrabble majority. Conventional wisdom says this gap cannot be closed. But it is closing—fast. The authors document how four forces—exponential technologies, the DIY innovator, the Technophilanthropist, and the Rising Billion—are conspiring to solve our biggest problems. Abundance establishes hard targets for change and lays out a strategic roadmap for governments, industry and entrepreneurs, giving us plenty of reason for optimism.Examining human need by category—water, food, energy, healthcare, education, freedom—Diamandis and Kotler introduce dozens of innovators making great strides in each area: Larry Page, Steven Hawking, Dean Kamen, Daniel Kahneman, Elon Musk, Bill Joy, Stewart Brand, Jeff Skoll, Ray Kurzweil, Ratan Tata, Craig Venter, among many, many others.

Ruby Under a Microscope


Pat Shaughnessy - 2012
    Author Pat Shaughnessy takes a scientific approach, laying out a series of experiments with Ruby code to take you behind the scenes of how programming languages work. You'll even find information on JRuby and Rubinius (two alternative implementations of Ruby), as well as in-depth explorations of Ruby's garbage collection algorithm. Ruby Under a Microscope will teach you:How a few computer science concepts underpin Ruby's complex implementation How Ruby executes your code using a virtual machine How classes and modules are the same inside Ruby How Ruby employs algorithms originally developed for Lisp How Ruby uses grammar rules to parse and understand your code How your Ruby code is translated into a different language by a compilerNo programming language needs to be a black box. Whether you're already intrigued by language implementation or just want to dig deeper into Ruby, you'll find Ruby Under a Microscope a fascinating way to become a better programmer. Covers Ruby 2.x, 1.9 and 1.8

Microsoft SQL Server 2012: T-SQL Fundamentals


Itzik Ben-Gan - 2012
    Led by a SQL Server expert, you’ll learn the concepts behind T-SQL querying and programming, and then apply your knowledge with exercises in each chapter. Once you understand the logic behind T-SQL, you’ll quickly learn how to write effective code—whether you’re a programmer or database administrator.Discover how to:Work with programming practices unique to T-SQLCreate database tables and define data integrityQuery multiple tables using joins and subqueriesSimplify code and improve maintainability with table expressionsImplement insert, update, delete, and merge data modification strategiesTackle advanced techniques such as window functions, pivoting and grouping setsControl data consistency using isolation levels, and mitigate deadlocks and blockingTake T-SQL to the next level with programmable objects

NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence


Pramod J. Sadalage - 2012
    Advocates of NoSQL databases claim they can be used to build systems that are more performant, scale better, and are easier to program." ""NoSQL Distilled" is a concise but thorough introduction to this rapidly emerging technology. Pramod J. Sadalage and Martin Fowler explain how NoSQL databases work and the ways that they may be a superior alternative to a traditional RDBMS. The authors provide a fast-paced guide to the concepts you need to know in order to evaluate whether NoSQL databases are right for your needs and, if so, which technologies you should explore further. The first part of the book concentrates on core concepts, including schemaless data models, aggregates, new distribution models, the CAP theorem, and map-reduce. In the second part, the authors explore architectural and design issues associated with implementing NoSQL. They also present realistic use cases that demonstrate NoSQL databases at work and feature representative examples using Riak, MongoDB, Cassandra, and Neo4j. In addition, by drawing on Pramod Sadalage's pioneering work, "NoSQL Distilled" shows how to implement evolutionary design with schema migration: an essential technique for applying NoSQL databases. The book concludes by describing how NoSQL is ushering in a new age of Polyglot Persistence, where multiple data-storage worlds coexist, and architects can choose the technology best optimized for each type of data access.

What Every Web Developer Should Know About HTTP (OdeToCode, #1)


K. Scott Allen - 2012
    We'll cover resources, messages, cookies, and authentication protocols. We'll look at how HTTP clients can use persistent and parallel connections to improve performance,and see how the web scales to meet demand using cache headers andproxy servers. By the end of the book you will have the knowledge tobuild better web applications and web services.

A Man and His Ship: America's Greatest Naval Architect and His Quest to Build the S.S. United States


Steven Ujifusa - 2012
    United States, was a topic of national fascination. When completed in 1952, the ship was hailed as a technological masterpiece at a time when “made in America” meant the best.Gibbs was an American original, on par with John Roebling of the Brooklyn Bridge and Frank Lloyd Wright of Fallingwater. Forced to drop out of Harvard following his family’s sudden financial ruin, he overcame debilitating shyness and lack of formal training to become the visionary creator of some of the finest ships in history. He spent forty years dreaming of the ship that became the S.S. United States.William Francis Gibbs was driven, relentless, and committed to excellence. He loved his ship, the idea of it, and the realization of it, and he devoted himself to making it the epitome of luxury travel during the triumphant post–World War II era. Biographer Steven Ujifusa brilliantly describes the way Gibbs worked and how his vision transformed an industry. A Man and His Ship is a tale of ingenuity and enterprise, a truly remarkable journey on land and sea.

Why School?: How Education Must Change When Learning and Information Are Everywhere


Will Richardson - 2012
    Instead, things like blogs and wikis, as well as remote collaborations and an emphasis on 'critical thinking' skills are the coins of the realm in this new kingdom. Yet the national dialogue on education reform focuses on using technology to update the traditional education model, failing to reassess the fundamental design on which it is built.In 'Why School?,' educator, author, parent and blogger Will Richardson challenges traditional thinking about education — questioning whether it still holds value in its current form. How can schools adjust to this new age? Or students? Or parents? In this provocative read, Richardson provides an in-depth look at how connected educators are beginning to change their classroom practice. Ultimately, 'Why School?' serves as a starting point for the important conversations around real school reforms that must ensue, offering a bold plan for rethinking how we teach our kids, and the consequences if we don't.

Addiction by Design: Machine Gambling in Las Vegas


Natasha Dow Schüll - 2012
    "Addiction by Design" takes readers into the intriguing world of machine gambling, an increasingly popular and absorbing form of play that blurs the line between human and machine, compulsion and control, risk and reward.Drawing on fifteen years of field research in Las Vegas, anthropologist Natasha Dow Schull shows how the mechanical rhythm of electronic gambling pulls players into a trancelike state they call the "machine zone," in which daily worries, social demands, and even bodily awareness fade away. Once in the zone, gambling addicts play not to win but simply to keep playing, for as long as possible--even at the cost of physical and economic exhaustion. In continuous machine play, gamblers seek to lose themselves while the gambling industry seeks profit. Schull describes the strategic calculations behind game algorithms and machine ergonomics, casino architecture and "ambience management," player tracking and cash access systems--all designed to meet the market's desire for maximum "time on device." Her account moves from casino floors into gamblers' everyday lives, from gambling industry conventions and Gamblers Anonymous meetings to regulatory debates over whether addiction to gambling machines stems from the consumer, the product, or the interplay between the two."Addiction by Design" is a compelling inquiry into the intensifying traffic between people and machines of chance, offering clues to some of the broader anxieties and predicaments of contemporary life.

Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors


Charles Platt - 2012
    You’ll learn what each one does, how it works, why it’s useful, and what variants exist. No matter how much you know about electronics, you’ll find fascinating details you’ve never come across before.Convenient, concise, well-organized, and precisePerfect for teachers, hobbyists, engineers, and students of all ages, this reference puts reliable, fact-checked information right at your fingertips—whether you’re refreshing your memory or exploring a component for the first time. Beginners will quickly grasp important concepts, and more experienced users will find the specific details their projects require.Unique: the first and only encyclopedia set on electronic components, distilled into three separate volumesIncredibly detailed: includes information distilled from hundreds of sourcesEasy to browse: parts are clearly organized by component typeAuthoritative: fact-checked by expert advisors to ensure that the information is both current and accurateReliable: a more consistent source of information than online sources, product datasheets, and manufacturer’s tutorialsInstructive: each component description provides details about substitutions, common problems, and workaroundsComprehensive: Volume 1 covers power, electromagnetism, and discrete semi-conductors; Volume 2 includes integrated circuits, and light and sound sources; Volume 3 covers a range of sensing devices.

The Launch Pad: Inside Y Combinator, Silicon Valley's Most Exclusive School for Startups


Randall E. Stross - 2012
    Their brand-new two- or three-person start-ups are given a seemingly impossible challenge: to turn a raw idea into a viable business, fast.   Each YC session culminates in a demo day, when investors and venture capitalists flock to hear pitches from the new graduates. Any one of them might turn out to be the next Dropbox (class of 2007, now valued at $5 billion) or Airbnb (2009, $1.3 billion).   Randall Stross is the first journalist to have fly-on-the-wall access to Y Combinator. He tells the full story of how Paul Graham started this ultra exclusive institution, how it chooses among hundreds of aspiring Mark Zuckerbergs, and how it teaches them to go from concept to profitability in record time.

Windows Internals, Part 2: Covering Windows Server 2008 R2 and Windows 7


Mark E. Russinovich - 2012
    Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windows Server 2008 R2—and now presents its coverage in two volumes.As always, you get critical insider perspectives on how Windows operates. And through hands-on experiments, you’ll experience its internal behavior firsthand—knowledge you can apply to improve application design, debugging, system performance, and support.In Part 2, you’ll examine:Core subsystems for I/O, storage, memory management, cache manager, and file systems Startup and shutdown processes Crash-dump analysis, including troubleshooting tools and techniques

The S.N. Killer


Shameek Speight - 2012
    In these current times there is not aperson that isn’t somehow linked to a social networking site. Technology has evolved in ways that allow you to access such sites from your iPad or cellphone. With that said, do you know the person behind your next friend request? Do you know the person behind that profile picture, or better yet the person you’ve been chatting with for months or the person you been flirting with, or do you just think you know? Detective Lauren Pitman and her partner Detective Alexis Lovett head a Special Division Unit, in charge of solving Internet Crimes. Those crimes include rape, homicide and missing persons to name a few. Recently women have been targeted throughout the Tri-State Area. Several victims have been found dead with missing body parts. What these women seem to have in common is that all these women were all online on different social networking sites, talking and interacting with a man, who police cannot seem to be able to trace or locate almost as if he doesn’t exist. A recent development has found that this particular social network killer is into cannibalism. Detective Lauren Pitman and Alexis Lovett must work fast to uncover the killers identity before he claims his next victim.

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys


Michael W. Lucas - 2012
    But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:Eliminate passwords.Manage access to your SSH server by users, groups, addresses, and moreSecurely move files around your networkForward graphic displays from one host to anotherForward TCP/IP connections Centrally manage host keys and client configurationsUse SSH as a secure transport for other applicationsSecure applications run over SSHBuild Virtual Private Networks with OpenSSHAnd more! This book quickly and painlessly simplifies life for anyone using SSH.Review"Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals." - Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger"...SSH Mastery is a title that Unix users and system administrators like myself will want to keep within reach..." - Peter Hansteen"This stripping-down of the usual tech-book explanations gives it the immediacy of extended documentation on the Internet. ...an in-depth presentation from someone who used OpenSSH to do a number of things, and paid attention while doing it." - Justin Sherrill, DragonFly BSD Digest

Comptia A+ Certification All-In-One Exam Guide: Exams 220-801 & 220-802


Mike Meyers - 2012
    Offers a review of the examination that includes test-taking strategies, discussion of relevant concepts, practice questions, and detailed answers.

Adobe Photoshop CS6 Classroom in a Book (Classroom in a Book (Adobe))


Adobe Creative Team - 2012
    Adobe Photoshop CS6 Classroom in a Book

Disciples of the Mysterium


Michael Tsarion - 2012
    It is written for those who wish to find themselves again.If you come to this work without a background in philosophy, you will learn a great deal. If you come to it after pacing labyrinths in search of philosophical understanding, you will discover the keys of enlightenment. The doors of perception are opened for beginner and seasoned seeker alike. Who are you and what are you thinking about? Do you know why you have been born? Are you in charge of your life? Are you an Individual? Michael Tsarion’s concept of “Mysteria” and our deep-set antipathy to Nature, provide us with intriguing and cogent explanations for age-old existential dilemmas. His radical theory on the origin of the ego is nothing less than a theory of pathology. Whether your interest in philosophical and psychological subjects is recent or long term, Michael’s analysis will enhance your understanding of yourself and the world you occupy. From Introduction......Chapter One looks at the pros and cons of world philosophy. Have our world and minds improved due to the centuries-old questioning of existence and reality? Are we right to heed what others says about reality? Why are there so many antagonistic attitudes, beliefs and schools of thought? Is it because there is no single, all-encompassing answer to life’s mysteries, or because appropriate questions are not asked? Why are the answers to questions about existence so elusive? What are the differences between philosophy and psychology, reason and belief, mind and matter; and can we be certain about anything we see, think and feel? Will we ever solve the problems that beset us?Chapter Two introduces a philosophical outlook I refer to as Objectionism. When taken seriously, this philosophy compels us to radically reevaluate what we know about consciousness and the process of philosophical investigation. I also introduce you to the basic tenets of Personalism. This philosophy has commonalities with Perspectivism, Relativism and Pragmatism, but goes beyond them, centering the Imperial Self, rather than the pseudo-self, at the heart of existence and reality.Chapter Three deals with the problem of God’s existence and ongoing rivalry between believers and non-believers. What causes the schism between purveyors of religious dogma and advocates of atheism, materialist scientists and metaphysicians? What does each side believe, and what are the arguments used by one side to checkmate the other?......(read more by clicking book thumbnail)Visit disciplesofthemysterium.com and objectionism.com

Async in C# 5.0


Alex Davies - 2012
    Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives

The People's Platform: Taking Back Power and Culture in the Digital Age


Astra Taylor - 2012
    But how true is this claim? In a seminal dismantling of techno-utopian visions, "The People's Platform" argues that for all that we "tweet" and "like" and "share," the Internet in fact reflects and amplifies real-world inequities at least as much as it ameliorates them. Online, just as off-line, attention and influence largely accrue to those who already have plenty of both.What we have seen so far, Astra Taylor says, has been not a revolution but a rearrangement. Although Silicon Valley tycoons have eclipsed Hollywood moguls, a handful of giants like Amazon, Apple, Google, and Facebook remain the gatekeepers. And the worst habits of the old media model--the pressure to seek easy celebrity, to be quick and sensational above all--have proliferated online, where "aggregating" the work of others is the surest way to attract eyeballs and ad revenue. When culture is "free," creative work has diminishing value, and advertising fuels the system. The new order looks suspiciously like the old one.We can do better, Taylor insists. The online world does offer a unique opportunity, but a democratic culture that supports diverse voices and work of lasting value will not spring up from technology alone. If we want the Internet to truly be a people's platform, we will have to make it so.

Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

OS X 10.8 Mountain Lion: the Ars Technica Review


John Siracusa - 2012
    Ars Technica's review of OS X 10.8 Mountain Lion.

Super Scratch Programming Adventure!: Learn to Program By Making Cool Games


The LEAD Project - 2012
    By dragging together colorful blocks of code, kids quickly learn computer programming concepts and make cool games and animations.In Super Scratch Programming Adventure!, kids learn programming fundamentals as they make their very own playable video games. They'll create projects inspired by classic arcade games that can be programmed (and played!) in an afternoon. The book's patient, step-by-step explanations of the code and fun programming challenges will have kids creating their own games in no time.This full-color comic book makes programming concepts like flow control, subroutines, and data types effortless to absorb. Packed with ideas for games that kids will be proud to show off, Super Scratch Programming Adventure! is the perfect first step for the budding programmer.

Arduino Workshop: A Hands-On Introduction with 65 Projects


John Boxall - 2012
    With an almost unlimited range of input and output add-ons, sensors, indicators, displays, motors, and more, the Arduino offers you countless ways to create devices that interact with the world around you.In Arduino Workshop, you'll learn how these add-ons work and how to integrate them into your own projects. You'll start off with an overview of the Arduino system but quickly move on to coverage of various electronic components and concepts. Hands-on projects throughout the book reinforce what you've learned and show you how to apply that knowledge. As your understanding grows, the projects increase in complexity and sophistication.Among the book's 65 projects are useful devices like:A digital thermometer that charts temperature changes on an LCD A GPS logger that records data from your travels, which can be displayed on Google Maps A handy tester that lets you check the voltage of any single-cell battery A keypad-controlled lock that requires a secret code to open You'll also learn to build Arduino toys and games like:An electronic version of the classic six-sided die A binary quiz game that challenges your number conversion skills A motorized remote control tank with collision detection to keep it from crashingArduino Workshop will teach you the tricks and design principles of a master craftsman. Whatever your skill level, you'll have fun as you learn to harness the power of the Arduino for your own DIY projects.

Best Practices for Teaching with Emerging Technologies


Michelle Pacansky-brock - 2012
    Best Practices for Teaching with Emerging Technologies will provide both new and experienced online, hybrid, and face-to-face instructors with:practical examples of how low-cost and free technologies can be used to support student learningbest practices for integrating web-based tools into a course management system and managing student privacy in a Web 2.0 environment"Showcase" spotlights woven throughout the book, providing examples of how the tools described in the book are already being used effectively in educational settingsan easy-to-reference format, organized with visual icons used to delineate each tool's visual, video, voice, and mobile featuresideas for integrating mobile learning into your students' learning experiences.This practical, easy-to-use guide will serve the needs of educators seeking to refresh or transform their instruction. Readers will be rewarded with an ample yet manageable collection of proven emerging technologies that can be leveraged for generating content, enhancing communications with and between students, and cultivating participatory, student-centered learning activities.

DAX Formulas for PowerPivot: A Simple Guide to the Excel Revolution


Rob Collie - 2012
    Written by the world's foremost PowerPivot blogger and practitioner, the book's concepts and approach are introduced in a simple, step-by-step manner tailored to the learning style of Excel users everywhere. The techniques presented allow users to produce, in hours or even minutes, results that formerly would have taken entire teams weeks or months to produce and include lessons on the difference between calculated columns and measures, how formulas can be reused across reports of completely different shapes, how to merge disjointed sets of data into unified reports, how to make certain columns in a pivot behave as if the pivot were filtered while other columns do not, and how to create time-intelligent calculations in pivot tables such as "Year over Year" and "Moving Averages" whether they use a standard, fiscal, or a complete custom calendar. The "pattern-like" techniques and best practices contained in this book have been developed and refined over two years of onsite training with Excel users around the world, and the key lessons from those seminars costing thousands of dollars per day are now available to within the pages of this easy-to-follow guide.

Eight Amazing Engineering Stories: Using the Elements to Create Extraordinary Technologies


Bill Hammack - 2012
    In eight chapters, the EngineerGuy team exposes the magnificence of the innovation and engineering of digital camera imagers, tiny accelerometers, atomic clocks, enriching fissile material, batteries, anodizing metals, microwave ovens, and lasers. To help readers of all backgrounds, the book also includes introductions to the scientific principles necessary for a deeper understanding of the material presented in the chapters. The reader will be delighted by primers on waves, nuclear structure, and electronic transitions. It also features “In depth” sections on entropy, semiconductors, and the mathematics of capacitors.

This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information


Andy Greenberg - 2012
    WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.

Energy for Future Presidents: The Science Behind the Headlines


Richard A. Muller - 2012
    citizens that nothing has more impact on our lives than the supply of and demand for energy. Its procurement dominates our economy and foreign policy more than any other factor. But the “energy question” is more confusing, contentious, and complicated than ever before. We need to know if nuclear power will ever really be safe. We need to know if solar and wind power will ever really be viable. And we desperately need to know if the natural gas deposits in Pennsylvania are a windfall of historic proportions or a false hope that will create more problems than solutions. Richard A. Muller provides all the answers in this must-read guide to our energy priorities now and in the coming years.

ZeroMQ: Messaging for Many Applications


Pieter Hintjens - 2012
    With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request-reply patterns that keep working when code or hardware fails Extend ØMQ’s core pub-sub patterns for performance, reliability, state distribution, and monitoring Learn techniques for building a distributed architecture with ØMQ Discover what’s required to build a general-purpose framework for distributed applications

The Rainforest: The Secret to Building the Next Silicon Valley


Victor W. Hwang - 2012
    Victor W. Hwang and Greg Horowitt propose a radical new theory to explain the nature of "innovation ecosystems": human networks that generate extraordinary creativity and output. They argue that free market thinking fails to consider the impact of human nature on the innovation process. This ambitious work challenges the basic assumptions that economists have held for over a century.The authors argue that such ecosystems - what they call Rainforests - can only thrive when certain cultural behaviors unlock human potential. People in Rainforests belong to "tribes of trust" and follow a secret unwritten code: the Rules of the Rainforest. The theory of the Rainforest is influenced by several breakthrough ideas in academia, including insights on sociobiology from Harvard, economic transactions from the University of Chicago, and design theory from Stanford. With an unorthodox and entertaining narrative, the book reveals the mysterious mechanisms of Rainforests. Furthermore, the authors provide practical tools for readers to design, build, and sustain new innovation ecosystems. The Rainforest will transform the way you think about technology, business, and leadership.

The Irish Origins of Civilization Volume One


Michael Tsarion - 2012
    Michael exposes the true origins of the world’s premier secret societies and reveals the remarkable mysteries they have been sworn to guard by sword and deception. He shows that the elements of civilization - megalithic construction, writing, music, astronomy, astrology, medicine, farming, navigation, and most importantly the principles of religion, originated in Britain, Ireland and Scandinavia. Every European needs to read this book to find out how the history of "Anglo-Saxon" man has been misrepresented and perverted. Michael explains the true meaning of the word Aryan and shows that it was the original name of Ireland. He explains the reason why so many tribes speak of the coming of the fair gods, the men of wisdom. He explains the connections between the Irish Druids and Egyptian Amenists and the ruin Akhenaton's Luciferian cult brought to Egypt and the world. As Michael wrote...

Photoshop CS6: The Missing Manual


Lesa Snider - 2012
    This book makes learning Photoshop a breeze by explaining things in a friendly, conversational style—without technical jargon. After a thorough introduction to the program, you’ll delve deep into Photoshop’s secrets with expert tips and practical advice you can use every day.The important stuff you need to know: Learn your way around. Get a guided tour of Photoshop’s beautiful new workspace. Unlock the magic. Discover the most practical ways to use layers, channels, masks, paths, and other tools. Fine-tune your images. Learn techniques for cropping, retouching, and combining photos. Play with color. Drain, change, and add color; and create gorgeous black-and-whites and duotones. Be artistic. Create original illustrations and paintings, use text and filters effectively, and edit video clips. Share your work. Produce great-looking images for print and the Web. Work smarter and faster. Automate common chores and install plug-ins for complex tasks.

Advanced Apex Programming for Salesforce.com and Force.com


Dan Appleman - 2012
    Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.

Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement


Eric Redmond - 2012
    As a modern application developer you need to understand the emerging field of data management, both RDBMS and NoSQL. Seven Databases in Seven Weeks takes you on a tour of some of the hottest open source databases today. In the tradition of Bruce A. Tate's Seven Languages in Seven Weeks, this book goes beyond your basic tutorial to explore the essential concepts at the core each technology. Redis, Neo4J, CouchDB, MongoDB, HBase, Riak and Postgres. With each database, you'll tackle a real-world data problem that highlights the concepts and features that make it shine. You'll explore the five data models employed by these databases-relational, key/value, columnar, document and graph-and which kinds of problems are best suited to each. You'll learn how MongoDB and CouchDB are strikingly different, and discover the Dynamo heritage at the heart of Riak. Make your applications faster with Redis and more connected with Neo4J. Use MapReduce to solve Big Data problems. Build clusters of servers using scalable services like Amazon's Elastic Compute Cloud (EC2). Discover the CAP theorem and its implications for your distributed data. Understand the tradeoffs between consistency and availability, and when you can use them to your advantage. Use multiple databases in concert to create a platform that's more than the sum of its parts, or find one that meets all your needs at once.Seven Databases in Seven Weeks will take you on a deep dive into each of the databases, their strengths and weaknesses, and how to choose the ones that fit your needs.What You Need: To get the most of of this book you'll have to follow along, and that means you'll need a *nix shell (Mac OSX or Linux preferred, Windows users will need Cygwin), and Java 6 (or greater) and Ruby 1.8.7 (or greater). Each chapter will list the downloads required for that database.

Pro ASP.NET MVC 4


Adam Freeman - 2012
    It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.ASP.NET MVC 4 contains a number of significant advances over previous versions. New mobile and desktop templates (employing adaptive rendering) are included together with support for jQuery Mobile for the first time. New display modes allow your application to select views based on the browser that's making the request while Code Generation Recipes for Visual Studio help you auto-generate project-specific code for a wide variety of situtations including NuGet support.In this fourth edition, the core model-view-controller (MVC) architectural concepts are not simply explained or discussed in isolation, but are demonstrated in action. You'll work through an extended tutorial to create a working e-commerce web application that combines ASP.NET MVC with the latest C# language features and unit-testing best practices. By gaining this invaluable, practical experience, you'll discover MVC's strengths and weaknesses for yourself--and put your best-learned theory into practice.The book's authors, Steve Sanderson and Adam Freeman, have both watched the growth of ASP.NET MVC since its first release. Steve is a well-known blogger on the MVC Framework and a member of the Microsoft Web Platform and Tools team. Adam started designing and building web applications 15 years ago and has been responsible for some of the world's largest and most ambitious projects. You can be sure you are in safe hands.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


T.J. O'Connor - 2012
    Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Socialized!: How the Most Successful Businesses Harness the Power of Social


Mark Fidelman - 2012
    But a huge challenge is still in the way: how to build programs and teams for accomplishing all that. While organizations have been fixated on how to use the latest social tool, they’ve lost sight of how to create a talent pool capable of adjusting to the next wave of technology around the corner. For corporations to successfully transform into social business enterprises they must shift the focus from computers and tools to developing skills and attitudes around technology.  Socialized!  represents a “playbook” on how to create such a high-performing social enterprise. Filled with clear strategies and real-life stories from visionaries and change makers, the book is designed to help leaders motivate employees throughout the organization to adopt a “social” mindset, ensuring success against the competition.

CCNA Security 640-554 Official Cert Guide


Keith Barker - 2012
    Book annotation not available for this title.Title: CCNA Security 640-554 Official Cert GuideAuthor: Barker, Keith/ Morris, ScottPublisher: Pearson P T RPublication Date: 2012/07/06Number of Pages: 647Binding Type: HARDCOVERLibrary of Congress: 2012022057

Comptia A+ 220-801 and 220-802 Exam Cram


David L. Prowse - 2012
     Limited Time Offer: Buy CompTIA(R) A+ 220-801 and 220-802 Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code:Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" CompTIA(R) A+ 220-801 and 220-802 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's A+ 220-801 and 220-802 exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 7, new PC hardware, tablets, smartphones, and professional-level networking and security. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last minute review. Covers the critical information you'll need to know to score higher on your CompTIA A+ 220-801 and 220-802 exams!Deploy and administer desktops and notebooks running Windows 7, Vista, or XPUnderstand, install, and troubleshoot motherboards, processors, and memoryTest and troubleshoot power-related problemsUse all forms of storage, including new Blu-ray and Solid State (SSD) devicesWork effectively with mobile devices, including tablets and smartphonesInstall, configure, and troubleshoot both visible and internal laptop componentsConfigure Windows components and applications, use Windows administrative tools, and optimize Windows systemsRepair damaged Windows environments and boot errorsWork with audio and video subsystems, I/O devices, and the newest peripheralsInstall and manage both local and network printersConfigure IPv4 and understand TCP/IP protocols and IPv6 changesInstall and configure SOHO wired/wireless networks and troubleshoot connectivityImplement secure authentication, prevent malware attacks, and protect data Companion CDThe companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Pearson IT Certifcation Practice Test Minimum System RequirementsWindows XP (SP3), WIndows Vista (SP2), or Windows 7Microsoft .NET Framework 4.0 ClientPentium-class 1 GHz processor (or equivalent)512 MB RAM650 MB disk space plus 50 MB for each downloaded practice exam David L. Prowse is an author, computer network specialist, and technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.

PROJECT BLUE BEAM - The Quest For A New World Order And The Rule Of The Antichrist


Aidan Brophilius - 2012
    The new age religion would be the very foundation for the new world government, without which religion the fierce dictatorship of the new world order would be completely impossible.This incredible book reveals every aspect of Project Blue Beam and all of its shocking details. Also included are in depth explanations of the new world order, its plans, the leaders in control of the new world order movement, and more!Please be advised. The information contained in this book is very controversial and may upset or anger some readers. Read at your own risk but always remember, the truth shall set you free!Below is a sampling of the topics and information that is included:THE NEW WORLD ORDER:- What is the New World Order?- What are the Forces behind New World Order?- Secret Societies and the New World Master Plan - The Objectives of the New World Order - Criticism and Rebuttal surrounding the New World Order Theory - Proof of the New World Order - Project Blue Beam & How It Relates To The New World Order - The History of Project Blue Beam - The Purpose of Project Blue Beam - The Implementation of Project Blue Beam THE 4 STEPS OF PROJECT BLUE BEAM: Step 1: The Break Down of All Archaeological Knowledge Step 2: The Massive Space Show in the SkyStep 3: Two Way Electronic Thought ControlStep 4: Supernatural Manifestations Using Secret Technology PROJECT BLUE BEAM TECHNOLOGIES: - HAARP Weather Manipulation and Earthquake Weapon- Alien Invasion Technologies- Mind Control and Two Way Telepathic Communication- Tracking Technologies- Cloning Technology- Mob Control- 3D Holographic and Voice Technology All of these topics will be revealed...We the people can and will prevail! We shall defeat this new world order! All we need is love, peace, knowledge, and action. So step out of the darkness and into the light. Don’t be fooled by the elite’s mass deception. Discover the secrets behind Project Blue Beam and the New World Order Today! Before it’s too late…

Working with TCP Sockets


Jesse Storimer - 2012
    It starts with the fundamentals that are portable to any environment. Then shows you the beautiful abstractions that Ruby has layered on top.Learning this stuff doesn't just apply to Ruby: every modern programming language has support for networking. Every language has their own way of doing things, but all modern languages support the Berkeley Sockets API. There's certainly plenty of syntactic sugar, but below the sugar you can use the same Sockets API that you would in C, Java, Python, whatever. This is portable knowledge that will serve you for many years to come.http://workingwithtcpsockets.com/

VMware vSphere 5.1 Clustering Deepdive


Duncan Epping - 2012
    It provides the knowledge and expertise needed to create a cloud infrastructure based on the solid foundation of vSphere HA, vSphere DRS and vSphere Storage DRS. It explains the concepts and mechanisms behind HA, DRS and Storage DRS which will enable you to make well educated decisions. Besides a brand new stretched cluster use case section it includes a fully rewritten Storage DRS section, and new details on both vSphere HA and vSphere DRS.This book will take you in to the trenches of HA, DRS and Storage DRS and will give you the tools to understand and implement e.g. HA admission control policies, DRS resource pools, Datastore Clusters and resource allocation settings. Each section contains basic design principles that can be used for designing, implementing or improving VMware infrastructures.Coverage includes:Stretched Clusters HA node types HA isolation detection and response HA admission control VM Monitoring HA and DRS integration DRS imbalance algorithm Resource Pools Impact of reservations and limits CPU Resource Scheduling Memory Scheduler DPM Datastore Clusters Storage DRS algorithm Influencing SDRS recommendations

Diablo III Signature Series Guide


Doug Walsh - 2012
     Exhaustive Bestiary, detailing every monster in the game. In-depth coverage of Heroes to maximize player effectiveness in all five Character Classes. Guide to meeting and leveling up the Blacksmith, Jeweler, and Mystic professions, and how to maximize the relationships and crafting from each Artisan. Presentation of item types, weapons, collectibles, and other loot. Plus: discussion of sets of items, how to get better loot, and manage raw materials. The only official resource to Blizzard's Online Auction House. Bid on and win rare items safely and effectively. Screen shots capture numerous indoor and outdoor areas in new regions of Sanctuary.

A Programmer's Rantings: On Programming-Language Religions, Code Philosophies, Google Work Culture, and Other Stuff


Steve Yegge - 2012
    Well, and wine. Put enough angst in me, and I’ll start ranting. Pour in some wine, and the rants get mean—and funny. I still go back and read these posts now and then, and I always laugh. I was so mean.My angst grew out of traveling different roads than most programmers. Those roads forced me to see the world differently. Now I see all sorts of patterns that many experienced programmers fail to see—because, well, to put it bluntly, they’re stuck in ruts.Over the past 25 years I’ve done a bunch of dramatically different types of programming, and I’ve also written far more code than any programmer ever should. The long roads I’ve traveled have basically given me a sixth sense. I see dead people. And it sucks. If you’re ever unlucky enough to acquire a dreadful sixth sense, there are really only two choices: you can be angry and depressed about it, or you can laugh about it.So I try to laugh. It’s hard, but I’m getting better at it. The wine helps. Practice helps, too. You need to get in the habit of laughing—at yourself, at others, at the crazy world we live in—or in time you’ll just stop laughing altogether.When I first started ranting, I was the ugly American, stomping around in my posts, and essentially yelling “What the hell is wrong with all you people?” But over the next ten years or so, I like to think I’ve grown into more of an amateur software anthropologist. I now take cultural relativism seriously, and I try hard not to judge people who think differently from me.Of course I don’t mind poking fun at them, because I don’t mind people poking fun at me. And ultimately I would like to convince undecided programmers to share my view of the programming world, because programming works best if everyone nearby does it the same way. So I’ll continue to argue that my view, which I’ve recently taken to calling “software liberalism,” is a perfectly valid and perhaps even preferable way to do a lot of software development.Converting everyone to be more liberal is doomed to fail, of course. But even so, I hope I can still help people in radically different software cultures to understand each other better.I’m going to keep ranting, because it appears to be the only way to make a message sink in to a very large audience. Some people still tell me that my blog posts are too long. They tell me I could have made my “point” in under a hundred words. I have noticed that this complaint comes most often from people who disagree with me. They’re really just saying they want less work to voice their disagreement. But even some folks who agree with me find the posts too long to carry their attention, and they complain too.They’re missing the point, though. The posts aren’t too long. You need a certain minimum “heft” to penetrate. Through years of trial and error, I’ve found that the best way to get a lot of people to listen to you is to tell them a story. And you can’t spin a good yarn without settling in and enjoying the ride.So that’s what this book is. It’s really a bunch of stories. Each might take the form of an article, essay, guide, rant, or occasionally a fiction tale. But behind the structure, each one of them is sharing a story. Even if you don’t always agree, I’m hoping you’ll at least find the stories entertaining and, with luck, sometimes even eye-opening.The guys at Hyperink chose which of my posts to include, by and large, and they also came up with the overall chapter organization. I made a couple of tweaks, but what you’re looking at is largely their vision of how to curate this stuff into a cohesive book. I think they did an admirable job.I hope you enjoy the journey as much as I did.Steve Yegge

The Pursuit of Social Business Excellence


Vala Afshar - 2012
    If you are not a social business, you are also losing the opportunity to recruit and retain the very best talent in the market. In this social and mobile era, customers have choices and voices that are scaled and amplified like never before. For businesses to truly connect with their employees and customers they must be able to listen, respond, engage, and add value in a timely and robust manner. But, to truly connect we must do so by way of a personalized and mutually beneficial approach; and in order to do this well, we must embrace social collaboration.By reading the Pursuit of Social Business Excellence you will be able to 1) identify foundational success elements of a social business; 2) follow a prioritized and guided step by step transformation process; 3) measure progress and identify self-reinforcing confirmation points. 4) increase top line revenue, profit, employee retention and customer loyalty.Afshar and Martin are award winning enterprise technology and management executives who have unlocked the value of social business transformation to drive industry leading growth, customer loyalty and profitability. In 2011, Afshar pioneered and led the efforts to drive the innovation behind enterprise networking industries first social machines. In 2012 Afshar and Martin s company, Enterasys Networks, was recognized as one of Boston s best places to work and was also awarded for top services-collaboration innovation, best contact center and next generation quality leadership.The authors of this book are highly social individuals who sincerely appreciate and value your feedback. Please feel free to connect with them on Twitter: @ValaAfshar and @Brad_W_Martin

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7


Harlan Carvey - 2012
    It considers the core investigative and analysis concepts that are critical to the work of professionals within the digital forensic analysis community, as well as the need for immediate response once an incident has been identified. Organized into eight chapters, the book discusses Volume Shadow Copies (VSCs) in the context of digital forensics and explains how analysts can access the wealth of information available in VSCs without interacting with the live system or purchasing expensive solutions. It also describes files and data structures that are new to Windows 7 (or Vista), Windows Registry Forensics, how the presence of malware within an image acquired from a Windows system can be detected, the idea of timeline analysis as applied to digital forensic analysis, and concepts and techniques that are often associated with dynamic malware analysis. Also included are several tools written in the Perl scripting language, accompanied by Windows executables. This book will prove useful to digital forensic analysts, incident responders, law enforcement officers, students, researchers, system administrators, hobbyists, or anyone with an interest in digital forensic analysis of Windows 7 systems.

Beginning C for Arduino: Learn C Programming for the Arduino


Jack Purdum - 2012
    This book introduces you to the C programming language, reinforcing each programming structure with a simple demonstration of how you can use C to control the Arduino family of microcontrollers. Author Jack Purdum uses an engaging style to teach good programming techniques using examples that have been honed during his 25 years of university teaching. Beginning C for Arduino will teach you:The C programming language How to use C to control a microcontroller and related hardware How to extend C by creating your own library routines During the course of the book, you will learn the basics of programming, such as working with data types, making decisions, and writing control loops. You'll then progress onto some of the trickier aspects of C programming, such as using pointers effectively, working with the C preprocessor, and tackling file I/O. Each chapter ends with a series of exercises and review questions to test your knowledge and reinforce what you have learned.

Flip Your Classroom: Reach Every Student in Every Class Every Day


Aaron Sams - 2012
    From there, Jonathan Bergmann and Aaron Sams began the flipped classroom-students watched recorded lectures for homework and completed their assignments, labs, and tests in class with their teacher available. What Bergmann and Sams found was that their students demonstrated a deeper understanding of the material than ever before. This is the authors story, and they're confident it can be yours too. Learn what a flipped classroom is and why it works and get the information you need to flip a classroom. You'll also learn the flipped mastery model, where students learn at their own pace-furthering opportunities for personalized education. This simple concept is easily replicable in any classroom, doesn't cost much to implement, and helps foster self-directed learning. Once you flip, you wont want to go back! The International Society for Technology in Education (ISTE) is the trusted source for professional development, knowledge generation, advocacy and leadership for innovation. ISTE is the premier membership association for educators and education leaders engaged in improving teaching and learning by advancing the effective use of technology in PK-12 and teacher education. Home of the National Educational Technology Standards (NETS), the Center for Applied Research in Educational Technology (CARET), and ISTE's annual conference (formerly known as the National Educational Computing Conference, or NECC), ISTE represents more than 100,000 professionals worldwide. We support our members with information, networking opportunities, and guidance as they face the challenge of transforming education. Some of the areas in which we publish are: -Web. 2.0 in the classroom-RSS, podcasts, and more -National Educational Technology Standards (NETS) -Professional development for educators and administrators -Integrating technology into the classroom and curriculum -Safe practices for the Internet and technology -Educational technology for parents

Black Transparency: The Right to Know in the Age of Mass Surveillance


Metahaven - 2012
    More recently, in response to global political and economic developments, transparency became a loose set of strategies and tactics to scrutinize and expose the existing order--the behavior and secrets of governments, corporations and other organizations. The new transparency is vigilant, eclectic, immediate, and often humorous. From the revelations of WikiLeaks to the actions of Anonymous, it is more insurgent than institutional, and more civic than corporate, marking the emerging politization of a generation raised on global consumer culture. In Black Transparency, Metahaven investigates, questions, proclaims and illustrates design principles of this new movement and highlights its significance for architecture, art and design.

Netflixed: The Epic Battle for America's Eyeballs


Gina Keating - 2012
    They were surprised and elated when launch-day traffic in April 1998 crashed their server and resulted in 150 sales. Today, Netflix has more than 25 million subscribers and annual revenues above $3 billion. Yet long- term success-or even survival-is still far from guaranteed. Journalist Gina Keating recounts the absorbing, fast-paced drama of the company's turbulent rise to the top and its attempt to invent two new kinds of business. First it engaged in a grueling war against video-store behemoth Blockbuster, transforming movie rental forever. Then it jumped into an even bigger battle for online video streaming against Google, Hulu, Amazon, and the big cable companies. Netflix ushered in such innovations as DVD rental by mail, a patented online queue of upcom­ing rentals, and a recommendation algorithm called Cinematch that proved crucial in its struggle against bigger rivals. Yet for all its success, Netflix is still a polariz­ing company. Hastings is often heralded as a visionary-he was named Business Person of the Year in 2010 by Fortune-even as he has been called the nation's worst CEO. Netflix also faces disgruntled customers after price increases and other stumbles that could tarnish the brand forever. The quest to become the world's portal for pre­mium video on demand will determine nothing less than the future of entertainment and the Internet. Drawing on extensive new interviews and her years covering Netflix as a financial and entertainment reporter, Keating makes this tale as absorbing as it is important.

The Me 262 Stormbird: From the Pilots Who Flew, Fought, and Survived It


Colin D. Heaton - 2012
    Although conceived before the war, with the initial plans being drawn in April 1939, the Stormbird was beset with technological (particularly the revolutionary engines) and political difficulties, resulting in it not entering combat until August 1944, with claims of nineteen downed Allied aircraft. The performance of the Me 262 so far exceeded that of Allied aircraft that on 1 Sepember 1944, USAAF General Carl Spaatz remarked that if greater numbers of German jets appeared, they could inflict losses heavy enough to force cancellation of the Allied daylight bombing offensive. The story of how the Stormbird came to be is fascinating history, and it comes to life in the hands of noted historian Colin Heaton. Told largely in the words of the German aces who flew it, The Me 262 Stormbird provides the complete history of this remarkable airplane from the drawing boards to combat in the skies over the Third Reich. Features two forewords, one by Jorg Czypionka, Me 262 night fighter pilot, and another by historian and author Barrett Tillman.

Net Smart: How to Thrive Online


Howard Rheingold - 2012
    But how can we use digital media so that they make us empowered participants rather than passive receivers, grounded, well-rounded people rather than multitasking basket cases? In "Net Smart," cyberculture expert Howard Rheingold shows us how to use social media intelligently, humanely, and, above all, mindfully.Mindful use of digital media means thinking about what we are doing, cultivating an ongoing inner inquiry into how we want to spend our time. Rheingold outlines five fundamental digital literacies, online skills that will help us do this: attention, participation, collaboration, critical consumption of information (or "crap detection"), and network smarts. He explains how attention works, and how we can use our attention to focus on the tiny relevant portion of the incoming tsunami of information. He describes the quality of participation that empowers the best of the bloggers, netizens, tweeters, and other online community participants; he examines how successful online collaborative enterprises contribute new knowledge to the world in new ways; and he teaches us a lesson on networks and network building.Rheingold points out that there is a bigger social issue at work in digital literacy, one that goes beyond personal empowerment. If we combine our individual efforts wisely, it could produce a more thoughtful society: countless small acts like publishing a Web page or sharing a link could add up to a public good that enriches everybody.

Engineering a Safer World: Systems Thinking Applied to Safety


Nancy G. Leveson - 2012
    In this groundbreaking book, Nancy Leveson proposes a new approach to safety -- more suited to today's complex, sociotechnical, software-intensive world -- based on modern systems thinking and systems theory. Revisiting and updating ideas pioneered by 1950s aerospace engineers in their System Safety concept, and testing her new model extensively on real-world examples, Leveson has created a new approach to safety that is more effective, less expensive, and easier to use than current techniques.Arguing that traditional models of causality are inadequate, Leveson presents a new, extended model of causation (Systems-Theoretic Accident Model and Processes, or STAMP), then then shows how the new model can be used to create techniques for system safety engineering, including accident analysis, hazard analysis, system design, safety in operations, and management of safety-critical systems. She applies the new techniques to real-world events including the friendly-fire loss of a U.S. Blackhawk helicopter in the first Gulf War; the Vioxx recall; the U.S. Navy SUBSAFE program; and the bacterial contamination of a public water supply in a Canadian town. Leveson's approach is relevant even beyond safety engineering, offering techniques for "reengineering" any large sociotechnical system to improve safety and manage risk.

The Art of Being Free


Wendy McElroy - 2012
    But it is unlike any you have ever read. It deals with the current crisis in a way that no one else does. It has deep and fascinating research on all the main issues we face: the loss of security in the name of security, the state's role in strangling economic opportunity, the petty central-planning that has regimented every aspect of life, the loss of basic civil liberties. The argument is relentless, fresh, and eye opening as never before. But she goes a step further, even several steps further. She argues that your rights and freedom are too important to wait for political reform. We must take our fate into our own hands, and live free regardless of what the political elites are attempting to do to us. Can we live full, free, and prosperous lives in these times, starting now? McElroy says that we can and we must. She presents a new way of thinking about how to build civilization even when it is so under attack. In her view, the worst mistake we can make is to allow our lives to be consumed by politics and the awful realities that surround us. We must instead surround ourselves by people and things we truly love. The best way to fight back, she says, is to find and build freedom for ourselves. We must discover the art of being free. The last chapter alone has been called one of the most inspired and inspiring pleas for real-life liberty ever penned. Here we have a manual on not only what is wrong with the world but also for how to refuse to be beaten back by our overlords. Despite the subject matter, then, this is a libertarianism that is bright, upbeat, and triumphant, even in these times.

Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows®


Tarik Soulami - 2012
    Led by a member of the Windows Fundamentals Team at Microsoft, you’ll apply expert debugging and tracing techniques—and sharpen your C++ and C# code analysis skills—through practical examples and common scenarios. Learn why experienced developers use debuggers in every step of the development process, and not just when bugs appear.Discover how to:Go behind the scenes to examine how powerful Windows debuggers workCatch bugs early in the development cycle with static and runtime analysis toolsGain practical strategies to tackle the most common code defectsApply expert tricks to handle user-mode and kernel-mode debugging tasksImplement postmortem techniques such as JIT and dump debuggingDebug the concurrency and security aspects of your softwareUse debuggers to analyze interactions between your code and the operating systemAnalyze software behavior with Xperf and the Event Tracing for Windows (ETW) framework

Beginning Android 4 Application Development


Wei-Meng Lee - 2012
    Android 4 OS is, for the first time, a single solution for both smartphones and tablets, so if you master the information in this helpful guide, you'll be well on your way to successful development for both devices. From using activities and intents and creating rich user interfaces to working with SMS, messaging APIs, and the Android SDK, what you need is here.Provides clear instructions backed by real-world programming examples Begins with the basics and covers everything Android 4 developers need to know for both smartphones and tablets Explains how to customize activities and intents, create rich user interfaces, and manage data Helps you work with SMS and messaging APIs, the Android SDK, and using location-based services Details how to package and publish your applications to the Android Market Beginning Android 4 Application Development pares down the most essential steps you need to know so you can start creating Android applications today.

The Human Face of Big Data


Rick Smolan - 2012
    Its enable us to sense, measure, and understand aspects of our existence in ways never before possible. The Human Face of Big Data captures, in glorious photographs and moving essays, an extraordinary revolution sweeping, almost invisibly, through business, academia, government, healthcare, and everyday life. It's already enabling us to provide a healthier life for our children. To provide our seniors with independence while keeping them safe. To help us conserve precious resources like water and energy. To alert us to tiny changes in our health, weeks or years before we develop a life-threatening illness. To peer into our own individual genetic makeup. To create new forms of life.  And soon, as many predict, to re-engineer our own species. And we've barely scratched the surface . . . Over the past decade, Rick Smolan and Jennifer Erwitt, co-founders of Against All Odds Productions, have produced a series of ambitious global projects in collaboration with hundreds of the world's leading photographers, writers, and graphic designers. Their Day in the Life projects were credited for creating a mass market for large-format illustrated books (rare was the coffee table book without one).  Today their projects aim at sparking global conversations about emerging topics ranging from the Internet (24 Hours in Cyberspace), to Microprocessors (One Digital Day), to how the human race is learning to heal itself, (The Power to Heal) to the global water crisis (Blue Planet Run). This year Smolan and Erwitt dispatched photographers and writers in every corner of the globe to explore the world of “Big Data” and to determine if it truly does, as many in the field claim, represent a brand new toolset for humanity, helping address the biggest challenges facing our species. The book features 10 essays by noted writers:Introduction: OCEANS OF DATA by Dan GardnerChapter 1: REFLECTIONS IN A DIGITAL MIRROR by Juan Enriquez, CEO, BiotechnomomyChapter 2: OUR DATA OURSELVES by Kate Green, the EconomistChapter 3: QUANTIFYING MYSELF by AJ Jacobs, EsquireChapter 4: DARK DATA by Marc Goodman, Future Crime InstituteChapter 5:  THE SENTIENT SENSOR MESH by Susan Karlin, Fast CompanyChapter 6: TAKING THE PULSE OF THE PLANET by Esther Dyson, EDventureChapter 7: CITIZEN SCIENCE by Gareth Cook, the Boston GlobeChapter 8: A DEMOGRAPH OF ONE by Michael Malone, Forbes magazineChapter 9: THE ART OF DATA by Aaron Koblin, Google Artist in ResidenceChapter 10: DATA DRIVEN by Jonathan Harris, Cowbird The book will also feature stunning info graphics from NIGEL HOLMES.1) GOOGLING GOOGLE: all the ways Google uses Data to help humanity2) DATA IS THE NEW OIL3) THE WORLD ACCORDING TO TWITTER4) AUCTIONING EYEBALLS: The world of Internet advertising5) FACEBOOK: A Billion Friends

Comptia A+ 220-801 and 220-802 Practice Questions Exam Cram


David L. Prowse - 2012
    This package's highly realistic questions cover every area of knowledge for both new A+ exams: 220-801 and 220-802. Limited Time Offer: Buy CompTIA A+ 220-801 and 220-802 Practice Questions Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code: Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" Master Your Knowledge of the A+ Exam! Features 700 questions, organized to reflect the newest objectives for the A+ exams, so you can easily assess your knowledge of every topic.Each question includes a detailed answer explanation.Provides complete coverage of all objectives for the 220-801 and 220-802 A+ exams. CD Features 700 Practice Questions! 700 questions from this book are included on the CD, giving you yet another effective tool to assess your readiness for the A+ exam.Test engine features multiple test modes, questions that simulate actual A+ exams, and detailed answer explanations, among other features. David L. Prowse is an author, a computer network specialist, and a technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. Over the past decade he has also taught CompTIA A+, Network+, and Security+ certification courses, both in the classroom and via the Internet. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.

Food Blogging for Dummies


Kelly Senyei - 2012
    Here's what you need to know to manage the technical side of blogging, create a cool design, select the ideal content, style and photograph food, and share your kitchen inspirations as an active member of the online food community.Collect your tools — claim your domain, choose a blog platform, and establish your place in social mediaFind your niche — survey the blog landscape, meet your fellow food bloggers, select a blog name, and find your unique voiceServe it in style — see how to design a blog that serves up mouthwatering content as elegantly as a perfect table settingFeed their eyes — learn simple food-styling tricks and how to take photos that awaken the taste budsTo market, to market — find out how to market your blog, increase your search engine rankings, and make your blog payOpen the book and find:Why it's the perfect time to launch your blogWays to make your blog credibleAdvice on creating and presenting contentA primer in food blog legaleseDesign ideas to make your blog user-friendlySurprising ways to enhance your photosInsider food-styling tricksTips for tapping into ad networksLearn to:Find your voice and your niche in the food blogosphereEnhance your blog with superb design and photographyMake your recipes searchable and connect your blog to social mediaIN FULL COLOR!

Complete Electronics: Self-Teaching Guide with Projects


Earl Boysen - 2012
    Now completely updated for today's technology, this latest version combines concepts, self-tests, and hands-on projects to offer you a completely repackaged and revised resource. This unique self-teaching guide features easy-to-understand explanations that are presented in a user-friendly format to help you learn the essentials you need to work with electronic circuits.All you need is a general understanding of electronics concepts such as Ohm's law and current flow, and an acquaintance with first-year algebra. The question-and-answer format, illustrative experiments, and self-tests at the end of each chapter make it easy for you to learn at your own speed.Boasts a companion website that includes more than twenty full-color, step-by-step projects Shares hands-on practice opportunities and conceptual background information to enhance your learning process Targets electronics enthusiasts who already have a basic knowledge of electronics but are interested in learning more about this fascinating topic on their own Features projects that work with the multimeter, breadboard, function generator, oscilloscope, bandpass filter, transistor amplifier, oscillator, rectifier, and more You're sure to get a charge out of the vast coverage included in Complete Electronics Self-Teaching Guide with Projects!

The Eagle Has Landed: The Story of Apollo 11


Jeffrey K. Smith - 2012
    Nearly a half-century later, Armstrong's words still resonate: "That's one small step for man, one giant leap for mankind." The historic Space Race began with the Soviet Union launching the world's first orbiting satellite, Sputnik, on October 4, 1957 and ended with the successful Apollo 11 mission. While the Space Race is commonly remembered as a time of innovation and technological advances, powerful, yet often overlooked forces, were at play. Politics and money were among the prime catalysts of space exploration. While history was being made and new heroes were discovered, the aerospace industry reaped enormous profits and political careers blossomed. "The Eagle Has Landed: The Story of Apollo 11" chronicles the triumphs and tragedies of America's quest to land on the Moon, beginning with the stories of the visionaries who made made space explorating a reality. It is remarkable story of poltical gamesmanship, innovation, perserverence, and courage.

Half of What They Carried Flew Away


Andrea Rexilius - 2012
    They move in rivulets.They exist not only in their details.They contain their own extraordinary destiny.They live beside a family of small farmers.They are discovered and decide to emigrate.Their name is William.They are born a little girl.

SR-71, The Blackbird, Q&A


Terry Pappas - 2012
    The SR-71 was the epitome of this dream for three decades. The only way to beat the SR-71 was to rocket into space, and every astronaut in the office with me in the 1960s would have loved to have flown the Blackbird. In many ways it placed greater demand on piloting proficiency than any spacecraft. Terry's book answers all those questions you ever had about the wonderful challenge of controlling an airplane, flying at 80,000 feet and more than three times the speed of sound for hours at a time. -Walt Cunningham, Apollo 7

Remixing Composition: A History of Multimodal Writing Pedagogy


Jason Palmeri - 2012
    Palmeri revisits many of the classic texts of composition theory from the 1960s, 1970s, and 1980s, closely examining how past compositionists responded to “new media.” He reveals that long before the rise of personal computers and the graphic web, compositionists employed analog multimedia technologies in the teaching of composition. Palmeri discovers these early scholars anticipated many of our current interests in composing with visual, audio, and video texts.Using the concept of the remix, Palmeri outlines practical pedagogical suggestions for how writing teachers can build upon this heritage with digital activities, assignments, and curricula that meet the needs of contemporary students. He details a pluralist vision of composition pedagogy that explains the ways that writing teachers can synthesize expressivist, cognitive, and social-epistemic approaches.Palmeri reveals an expansive history of now forgotten multimodal approaches to composing moving images and sounds and demonstrates how current compositionists can productively remix these past pedagogies to address the challenges and possibilities of the contemporary digital era. A strikingly original take on the recent history of composition, Remixing Composition is an important work for the future of writing instruction in a digital age.

How to Create a Mind: The Secret of Human Thought Revealed


Ray Kurzweil - 2012
    In How to Create a Mind, Kurzweil presents a provocative exploration of the most important project in human-machine civilization—reverse engineering the brain to understand precisely how it works and using that knowledge to create even more intelligent machines.Kurzweil discusses how the brain functions, how the mind emerges from the brain, and the implications of vastly increasing the powers of our intelligence in addressing the world’s problems. He thoughtfully examines emotional and moral intelligence and the origins of consciousness and envisions the radical possibilities of our merging with the intelligent technology we are creating.Certain to be one of the most widely discussed and debated science books of the year, How to Create a Mind is sure to take its place alongside Kurzweil’s previous classics which include Fantastic Voyage: Live Long Enough to Live Forever and The Age of Spiritual Machines.

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It


Jonathan Zdziarski - 2012
    That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

The Leader's Guide to 21st Century Education: 7 Steps for Schools and Districts


Ken Kay - 2012
    Includes many first-of-its-kind features and discussions. KEY TOPICS Using the 4Cs, creating a community consensus around the 4Cs, aligning the system with the 4Cs, using the 4Cs to build professional capacity around the 4Cs, embedding the 4Cs into curriculum and assessment, using the 4Cs to support teachers, improving and innovating by creating a 4Cs organization. MARKET For educational leaders--superintendents, assistant superintendents, district leaders, principals, assistant principals, teacher leaders, and other school leaders. Also useful in K-12 professional development teacher education classes.

Training Kit (Exam 70-461): Querying Microsoft SQL Server 2012


Itzik Ben-Gan - 2012
    Work at your own pace through a series of lessons and practical exercises, and then assess your skills with practice tests on CD—featuring multiple, customizable testing options.Maximize your performance on the exam by learning how to:Create database objectsWork with dataModify dataTroubleshoot and optimize queriesYou also get an exam discount voucher—making this book an exceptional value and a great career investment.

Code Connected Volume 1


Pieter Hintjens - 2012
    He writes, "We live in a connected world, and modern software has to navigate this world. So the building blocks for tomorrow's very largest solutions are connected and massively parallel. It's not enough for code to be "strong and silent" any more. Code has to talk to code. Code has to be chatty, sociable, well-connected. Code has to run like the human brain, trillions of individual neurons firing off messages to each other, a massively parallel network with no central control, no single point of failure, yet able to solve immensely difficult problems. And it's no accident that the future of code looks like the human brain, because the endpoints of every network are, at some level, human brains."If you are a programmer, working in C, C++, C#, Clojure, Delphi, Erlang, Go, Haskell, Haxe, Java, Lisp, Lua, Node.js, Objective-C, Perl, PHP, Python, Ruby, Scala, or Tcl, and you aim to build multithreaded or distributed systems, then this book is essential reading.Code Connected Volume 1 takes you through learning ZeroMQ (0MQ), step-by-step, with over 80 examples. You will learn the basics, the API, the different socket types and how they work, reliability, and a host of patterns you can use in your applications.

The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!


Lisa Morosky - 2012
    It also includes interviews with successful virtual assistants, interviews with clients who utilize a virtual assistant, resources at the end of most chapters, a 30-day reading guide and action plan, and access to The Bootstrap VA Facebook Group where readers can bounce ideas off of each other, ask Lisa questions, and get the support needed no matter where they are in the process of becoming and working as a virtual assistant.If you want to get started as a virtual assistant, and you're a go-getter looking to bootstrap your way to success, this is an eBook you can't afford to miss.ABOUT THE AUTHORLisa Morosky is the author of "The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!" and is a premier virtual assistant in the blogging, Internet marketing, social media, and online business realms. As the founder of VAforBloggers.com, Lisa worked with dozens of clients from 2009-2011, received mentions by and recommendations from top experts, spoke at the BlogWorld conference in Las Vegas, and built a business from the ground up. In 2011, Lisa made the decision to cut back, reposition her services and her client base, and spend more time on personal projects. She moved her services to her new, centralized home at The Home Life {and Me}, lowered her rates (to pass on her new savings to her clients), and changed her title to "blog helper". In 2012, Lisa launched her virtual assistant coaching services.In addition to being a virtual assistant and a virtual assistant coach, Lisa is a Christ follower, a proud wife to her amazing husband, a homemaker, a real foodie, and a lover of all things simple and natural. You can find her blogging about creating a simple, natural, faith-inspired home life at http://www.thehomelifeand.me.

Sweating Bullets: Notes about Inventing PowerPoint


Robert Gaskins - 2012
    Robert Gaskins (who invented the idea, managed its design and development, and then headed the new Microsoft group) has written this book to commemorate the twenty-fifth anniversary of PowerPoint, recounting stories of the perils narrowly evaded as a startup, dissecting the complexities of being the first distant development group in Microsoft, and explaining decisions and insights that enabled PowerPoint to become a lasting success.

The Trapper's Bible: The Most Complete Guide to Trapping and Hunting Tips Ever


Eustace Hazard Livingston - 2012
    Here are details on a wide variety of different traps and extensive information outlining the behavior and nature of a long list of animals commonly hunted and trapped:Deer and mooseMuskrat, and beaverWolf, coyote, and foxBlack bear and grizzly bear.Raccoon and rabbitSkunk, weasel, and woodchuckAnd much more!The Trapper’s Bible offers the best of the best. It’s an amazing collection of hard-to-find information and an informative look into life as a trapper.

Pro ASP.NET 4.5 in C#


Adam Freeman - 2012
    Pro ASP.NET 4.5 in C# is the most complete reference to ASP.NET that you will find. This comprehensively revised fifth edition will teach you everything you need to know in order to create well-designed ASP.NET websites. Beginning with core concepts the book progresses steadily through key professional skills. You'll be shown how to query databases in detail, consider the myriad applications of XML, and step through all the considerations you need to be aware of when securing your site from intruders. Finally, you'll consider advanced topics such as using client-side validation, jQuery and Ajax.By the time you have read this book you will have learned all the skills you need to use ASP.NET 4.5 with confidence.

Mechanics of Innovation: The Essential Handbook for Inventors, Engineers, Scientists, & Physicians


McMurtrey - 2012
    This comprehensive guide also presents a clear framework for navigating the complexities of patents, finance, grants, regulatory compliance, technology creation, and many other aspects. This serves as an indispensable tool for a wide variety of entrepreneurs seeking to translate their ideas into future technologies and innovations. With several tips and tricks for succeeding on a minimal budget, this work covers crucial steps from beginning to end, including:Logistics & setup, accelerators & incubators, grant writing instructions & opportunities, federal research programs & resources, angel financing, venture capital funding, intellectual property protection, patent writing, partnership & licensing agreements, non-disclosure agreements, regulatory approval & compliance, clinical studies & outlines, FDA approval pathways, guidance for drugs, devices, and biologics, investigational device & 510(k) outlines, healthcare reimbursement, & much more!!

Flattening Classrooms, Engaging Minds: Move to Global Collaboration One Step at a Time (Pearson Resources for 21st Century Learning)


Julie Lindsay - 2012
    Book annotation not available for this title.

The Romantic Machine: Utopian Science and Technology After Napoleon


John Tresch - 2012
    Many challenged the Enlightenment's emphasis on mechanics and questioned the rising power of machines, seeking a return to the organic unity of an earlier age and triggering the artistic and philosophical movement of romanticism. Previous scholars have viewed romanticism and industrialization in opposition, but in this groundbreaking volume John Tresch reveals how thoroughly entwined science and the arts were in early nineteenth-century France and how they worked together to unite a fractured society. Focusing on a set of celebrated technologies, including steam engines, electromagnetic and geophysical instruments, early photography, and mass-scale printing, Tresch looks at how new conceptions of energy, instrumentality, and association fueled such diverse developments as fantastic literature, popular astronomy, grand opera, positivism, utopian socialism, and the Revolution of 1848. He shows that those who attempted to fuse organicism and mechanism in various ways, including Alexander von Humboldt and Auguste Comte, charted a road not taken that resonates today. Essential reading for historians of science, intellectual and cultural historians of Europe, and literary and art historians, The Romantic Machine is poised to profoundly alter our understanding of the scientific and cultural landscape of the early nineteenth century.

Train Wreck: The Forensics of Rail Disasters


George Bibel - 2012
    When these metal monsters collide or go off the rails, their destructive power becomes clear. In this book, George Bibel presents riveting tales of trains gone wrong, the detective work of finding out why, and the safety improvements that were born of tragedy.Train Wreck details 17 crashes in which more than 200 people were killed. Readers follow investigators as they sift through the rubble and work with computerized event recorders to figure out what happened. Using a mix of eyewitness accounts and scientific explanations, Bibel draws us into a world of forensics and human drama.Train Wreck is a fascinating exploration of• runaway trains• bearing failures• metal fatigue• crash testing • collision dynamics• bad rails

The Social Media Mind: How social media how social media is changing business, politics and science and helps create a new world order.


David Amerland - 2012
    It has become the secret sauce that's humbled global corporations, brought down oppressive governments, is unlocking secrets science has tried to unlock for almost half a century and it continues to change our world with every passing day. In 'The Social Media Mind' you get to understand the fundamental drives governing the disruption social media creates, and how to use it properly.

Innovation Economics: The Race for Global Advantage


Robert D. Atkinson - 2012
    What does this portend? Robert Atkinson and Stephen Ezell, widely respected economic thinkers, report on profound new forces that are shaping the global economy—forces that favor nations with innovation-based economies and innovation policies. Unless the United States enacts public policies to reflect this reality, Americans face the relatively lower standards of living associated with a noncompetitive national economy.The authors explore how a weak innovation economy not only contributed to the Great Recession but is delaying America's recovery from it and how innovation in the United States compares with that in other developed and developing nations. Atkinson and Ezell then lay out a detailed, pragmatic road map for America to regain its global innovation advantage by 2020, as well as maximize the global supply of innovation and promote sustainable globalization.

HTML5 in Action


Rob Crowther - 2012
    You'll explore every aspect of the HTML5 specification through real-world examples and code samples. It's much more than just a specification reference, though. It lives up to the name HTML5 in Action by giving you the practical, hands-on guidance you'll need to use key features.About the TechnologyHTML5 is not a few new tags and features added to an old standard—it's the foundation of the modern web, enabling its interactive services, single-page UI, interactive games, and complex business applications. With support for standards-driven mobile app development, powerful features like local storage and WebSockets, superb audio and video APIs, and new layout options using CSS3, SVG, and Canvas, HTML5 has entered its prime time.About the BookHTML5 in Action provides a complete introduction to web development using HTML5. It explores the HTML5 specification through real-world examples and code samples. It earns the name "in Action" by giving you the practical, hands-on guidance you'll need to confidently build the sites and applications you—and your clients—have been wanting for years.This book concentrates on new HTML5 features and assumes you are familiar with standard HTML.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideNew semantic elements and form input typesSingle-page application designCreating interactive graphicsMobile web appsAbout the AuthorsRob Crowther is a web developer and blogger and the author of Manning's Hello! HTML5 & CSS3. Joe Lennon is an enterprise mobile application developer. Ash Blue builds award-winning interactive projects. Greg Wanish is an independent web and eCommerce developer.Table of ContentsPART 1 INTRODUCTIONHTML5: from documents to applicationsPART 2 BROWSER-BASED APPSForm creation: input widgets, data binding, and data validationFile editing and management: rich formatting, file storage, drag and dropMessaging: communicating to and from scripts in HTML5Mobile applications: client storage and offline executionPART 3 INTERACTIVE GRAPHICS, MEDIA, AND GAMING2D Canvas: low-level, 2D graphics renderingSVG: responsive in-browser graphicsVideo and audio: playing media in the browserWebGL: 3D application developmentPlus 10 Appendixes

Scholastic Discover More: Technology


Clive Gifford - 2012
    Within the next hour, you will probably use a computer, the internet, a hand-held game, or a cell phone. Technology is not only playing an ever-increasing role in our everyday lives, but also in the way we explore the world around us. Cool technology is useful, but what do we know about how it works? This book investigates the science behind technology, taking readers on a journey of discovery that they will never forget. It uncovers the smart tech of mobile phones, wi-fi, and GPS, as well as the inner workings of game consoles. It examines the world of movement--how cars, airplanes, and other vehicles run. It delves into nanotechnology, spy gadgets, cyborgs, building in space, and the eco house. Explore the pages of this book to discover how the coolest technology of today really works!

Third-Party Javascript


Ben Vinegar - 2012
    You'll learn dozens of techniques for developing widgets that collect data for analytics, provide helpful overlays and dialogs, or implement features like chat or commenting. The concepts and examples throughout this book represent the best practices for this emerging field, based on thousands of real-world dev hours and results from millions of users.About this BookThere's an art to writing third-party JavaScript—embeddable scripts that can plug into any website. They must adapt easily to unknown host environments, coexist with other applications, and manage the tricky security vulnerabilities you get when code and asset files are served from remote web addresses. Get it right and you have unlimited options for distributing your apps. This unique book shows you how.Third-Party JavaScript guides you through the ins and outs of building full-featured third-party JavaScript applications. You'll learn techniques for developing widgets that collect data for analytics, provide helpful overlays and dialogs, or implement features like chat and commenting. The concepts and examples throughout the book represent the best practices for this emerging field, based on thousands of real-world dev hours and results from millions of users.Written for web developers who know JavaScript, this book requires no prior knowledge of third-party apps.What's InsideWriting conflict-free JavaScript, HTML, and CSS Making cross-domain requests from the browser How to overcome third-party cookie limitations Security vulnerabilities of third-party applicationsPurchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the AuthorsBen Vinegar is an engineer at Disqus, a third-party JavaScript commenting platform. Anton Kovalyov is a software engineer at Mozilla. They are third-party applications experts whose work has been distributed on millions of websitesTable of ContentsIntroduction to third-party JavaScript Distributing and loading your application Rendering HTML and CSS Communicating with the server Cross-domain iframe messaging Authentication and sessions Security Developing a third-party JavaScript SDK Performance Debugging and testing

Murach's MySQL


Joel Murach - 2012
    As you would expect, this book shows how to code all of the essential SQL statements for creating and working with a MySQL database. But beyond that, this book also shows how to design a database, including how to use the graphical MySQL Workbench to create an EER model. It shows how to take advantage of relatively new MySQL features such as foreign keys, transactions, stored procedures, stored functions, triggers, and events. It even presents a starting set of skills for a database administrator (DBA), including how to secure and back up databases. And like all Murach books, it uses the distinctive paired pages format, which breaks the material into manageable skills to speed up both learning and reference. A great help for MySQL users at any level.

Build, Borrow, or Buy: Solving the Growth Dilemma


Laurence Capron - 2012
    When these strategies falter, the common response is simply to try harder—but firms falling into this “implementation trap” usually end up losing out to a competitor whose approach is more inclusive.So where do you start? By asking the right questions, argue INSEAD’s Laurence Capron and coauthor Will Mitchell, of the Rotman School of Management at the University of Toronto and Duke University’s Fuqua School of Business. Drawing on decades of research and teaching, Capron and Mitchell find that a firm’s aptitude for determining the best resource pathways for growth has a defining impact on its success. They’ve come up with a helpful framework, reflecting practices of a variety of successful global organizations, to determine which path is best for yours.The resource pathways framework is built around three strategic questions:• BUILD: Are your existing internal resources relevant for developing the new resources that you have targeted for growth?• BORROW: Could you obtain the targeted resources via an effective relationship with a resource partner?• BUY: Do you need broad and deep relationships with your resource provider?Written for large multinationals and emerging firms alike, Build, Borrow, or Buy will help solve a perennial question and will guide you through change while priming your organization for optimal growth.

Measuring Data Quality for Ongoing Improvement: A Data Quality Assessment Framework


Laura Sebastian-Coleman - 2012
    You ll start with general concepts of measurement and work your way through a detailed framework of more than three dozen measurement types related to five objective dimensions of quality: completeness, timeliness, consistency, validity, and integrity. Ongoing measurement, rather than one time activities will help your organization reach a new level of data quality. This plain-language approach to measuring data can be understood by both business and IT and provides practical guidance on how to apply the DQMF within any organization enabling you to prioritize measurements and effectively report on results. Strategies for using data measurement to govern and improve the quality of data and guidelines for applying the framework within a data asset are included. You ll come away able to prioritize which measurement types to implement, knowing where to place them in a data flow and how frequently to measure. Common conceptual models for defining and storing of data quality results for purposes of trend analysis are also included as well as generic business requirements for ongoing measuring and monitoring including calculations and comparisons that make the measurements meaningful and help understand trends and detect anomalies. Demonstrates how to leverage a technology independent data quality measurement framework for your specific business priorities and data quality challenges Enables discussions between business and IT with a non-technical vocabulary for data quality measurement Describes how to measure data quality on an ongoing basis with generic measurement types that can be applied to any situation

An Illustrated History of Islamic Architecture: An Introduction to the Architectural Wonders of Islam, from Mosques, Tombs and Mausolea to Gateways, Palaces and Citadels


Moya Carey - 2012
    Features all the most outstanding examples of Islamic architecture, such as the Dome of the Rock in Jerusalem, the Great Mosque in Damascus, the many richly decorated desert palaces, the Taj Mahal at Agra, Topkapi Palace at Istanbul, and today s modern Dubai skyscrapers."

Microsoft SQL Server 2012 Integration Services


Wee-Hyong Tok - 2012
    See best practices in action and dive deep into the SSIS engine, SSISDB catalog, and security features. Using the developer enhancements in SQL Server 2012 and the flexible SSIS toolset, you’ll handle complex data integration scenarios more efficiently—and acquire the skills you need to build comprehensive solutions. Discover how to:Use SSIS to extract, transform, and load data from multiple data sources Apply best practices to optimize package and project configuration and deployment Manage security settings in the SSISDB catalog and control package access Work with SSIS data quality features to profile, cleanse, and increase reliability Monitor, troubleshoot, and tune SSIS solutions with advanced features such as detailed views and data taps Load data incrementally to capture an easily consumable stream of insert, update, and delete activity

Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws and Practices


Peter P. Swire - 2012
    

Terrorism and Counterintelligence: How Terrorist Groups Elude Detection


Blake W. Mobley - 2012
    Some strategies work well, some fail, and those tasked with tracking these groups are deeply invested in the difference.Discussing the challenges terrorist groups face as they multiply and plot international attacks, while at the same time providing a framework for decoding the strengths and weaknesses of their counterintelligence, Blake W. Mobley provides an indispensable text for the intelligence, military, homeland security, and law enforcement fields. He outlines concrete steps for improving the monitoring, disruption, and elimination of terrorist cells, primarily by exploiting their mistakes in counterintelligence.A key component of Mobley's approach is to identify and keep close watch on areas that often exhibit weakness. While some counterintelligence pathologies occur more frequently among certain terrorist groups, destructive bureaucratic tendencies, such as mistrust and paranoia, pervade all organizations. Through detailed case studies, Mobley shows how to recognize and capitalize on these shortcomings within a group's organizational structure, popular support, and controlled territory, and he describes the tradeoffs terrorist leaders make to maintain cohesion and power. He ultimately shows that no group can achieve perfect secrecy while functioning effectively and that every adaptation or new advantage supposedly attained by these groups also produces new vulnerabilities.

Microsoft Word 2013 Step by Step


Joan Lambert - 2012
    With Step by Step, you set the pace—building and practicing the skills you need, just when you them! Includes downloadable practice files and a companion eBook.Work with Word on your PC or touch-enabled device Master the core tools for designing and editing documents Manage page layout, style, and navigation Use tables and charts to organize information Insert pictures, graphics, and video Use collaboration and review features

The Science Behind Alien Encounters


Robert Farrell - 2012
    This book was written to remove the mystique associated with #UFOs and #ETs. I try to give a “nuts & bolts” explanation for the fantastic things that have been reported. I believe my years as an engineering professor have prepared me for this by teaching me how to explain complex things in ways that are easy to understand. I try to do this using only three dimensions plus time and using #classical #physics with a little #relativity thrown in. I stay away from #parallel #universes, eleven dimensions, wormholes, and #time #travel into the past. While I do believe that #time #dilation does allow us to go into the #future, I am skeptical about going backward in time. One of my heroes was #Albert #Einstein and I make use of his technique of using #thought #experiments to get my points across.Within this book, I will discuss many topics within the field of #ufology. I will begin by discussing the UFO Crash at Kingman, Arizona. This forms the centerpiece of my #Alien #Log series of novels. The reader will be given a brief history of UFO #sightings. The search for #extraterrestrial #life and ETs will be covered. The ET presence throughout our history extending back to the #Sumerian civilization will be reviewed in light of ET presence. The notion that the #Great #Pyramid of #Giza may have been built as a power plant will be explored. If ETs exist then why have they not made contact? Perhaps they have. Find out how. There is a lengthy discussion explaining how UFOs do the amazing things reported by thousands of people, many of whom are highly trained observers. Evidence is given for the hypothesis that UFOs are propelled by manipulation or creation of #gravitational #fields. I will discuss the theory and work being done by researchers to generate gravitational fields. How can UFOs travel thousands of miles per hour without creating #sonic #booms? How can they accelerate at over 100 Gs without harm to the occupants? How do they #cloak themselves? All of this and more will be discussed. Given the tremendous technology displayed by UFOs, one wonders why they crash. There are some thoughts on this. What the ETs are up to? I give my take on that. Do you believe in the #Big #Bang theory? Learn an alternative explanation of how the #universe began in a way that does not begin as a singularity, does not violate basic laws of physics, does not require mystical “#dark #energy”, and accounts for the tremendous amount of angular momentum present in the universe.I hope you will find this work not only informative but also enjoyable to read.

A History of Optics from Greek Antiquity to the Nineteenth Century


Olivier Darrigol - 2012
    It shows how light gradually became the central entity of a domain of physics that no longer referred to the functioning of the eye; it retraces thesubsequent competition between medium-based and corpuscular concepts of light; and it details the nineteenth-century flourishing of mechanical ether theories. The author critically exploits and sometimes completes the more specialized histories that have flourished in the past few years. Theresulting synthesis brings out the actors' long-term memory, their dependence on broad cultural shifts, and the evolution of disciplinary divisions and connections. Conceptual precision, textual concision, and abundant illustration make the book accessible to a broad variety of readers interested inthe origins of modern optics.

Social Media for Educators: Strategies and Best Practices


Tanya Joosten - 2012
    In addition, the author offers strategies for assessing and documenting the effectiveness of using these tools in your course. Administrators and student affairs professionals will also find a wealth of information useful for planning faculty development programs and communicating with students.Although the book focuses on higher education, tools and techniques presented here can be easily generalized for K–12 classrooms or organizational learn­ing. The best practices and faculty development tips can be informative for individuals involved in any kind of professional development or network-building.

E-learning 101: It's not as tough as it looks


Liz Hardy - 2012
    Save you time – by quickly explaining how everything works (it’s much faster than guessing on your own).2. Stop you worrying – by replacing your fears with action and progress.3. Make you more confident – by giving you step-by-step strategies for dealing with the tricky parts.E-learning 101 can help you if you’re:• Somewhere between slightly nervous, and frankly terrified • Frustrated with having to guess about what to do next • Too busy to wade through enormous books about online learning• Keen to make progress on your course right now.In 6 short lessons, you’ll find the solutions to your biggest e-learning questions. And you’ll discover that e-learning’s really not as tough as it looks.

How to Recruit and Hire Great Software Engineers: Building a Crack Development Team


Patrick McCuller - 2012
    How to Recruit and Hire Great Software Engineers: Building a Crack Development Team is a field guide and instruction manual for finding and hiring excellent engineers that fit your team, drive your success, and provide you with a competitive advantage. Focusing on proven methods, the book guides you through creating and tailoring a hiring process specific to your needs. You'll learn to establish, implement, evaluate, and fine-tune a successful hiring process from beginning to end. Some studies show that really good programmers can be as much as 5 or even 10 times more productive than the rest. How do you find these rock star developers? Patrick McCuller, an experienced engineering and hiring manager, has made answering that question part of his life's work, and the result is this book. It covers sourcing talent, preparing for interviews, developing questions and exercises that reveal talent (or the lack thereof), handling common and uncommon situations, and onboarding your new hires.How to Recruit and Hire Great Software Engineers will make your hiring much more effective, providing a long-term edge for your projects. It will:Teach you everything you need to know to find and evaluate great software developers. Explain why and how you should consider candidates as customers, which makes offers easy to negotiate and close. Give you the methods to create and engineer an optimized process for your business from job description to onboarding and the hundreds of details in between. Provide analytical tools and metrics to help you improve the quality of your hires. This book will prove invaluable to new managers. But McCuller's deep thinking on the subject will also help veteran managers who understand the essential importance of finding just the right person to move projects forward. Put into practice, the hiring process this book prescribes will not just improve the success rate of your projects--it'll make your work life easier and lot more fun.