Advanced Apex Programming for Salesforce.com and Force.com


Dan Appleman - 2012
    Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.

Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell


Phil Lapsley - 2013
    Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Phil Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

The First Survivors of Alzheimer's: How Patients Recovered Life and Hope in Their Own Words


Dale E. Bredesen - 2021
    In his first two books, Dr. Dale Bredesen outlined the revolutionary treatments that are changing what had previously seemed like the inevitable outcome of cognitive decline and dementia. And in these moving narratives, you can hear directly from the first survivors of Alzheimer's themselves--their own amazing stories of hope told in their own words. These first person accounts honestly detail the fear, struggle, and ultimate victory of each patient's journey. They vividly describe what it is like to have Alzheimer's. They also drill down on how each of these patients made the program work for them--the challenges, the workarounds, the encouraging results that are so motivating. Dr. Bredesen includes commentary following each story to help point readers to the tips and tricks that might help them as well.Dr. Bredesen's patients have not just survived; they have thrived to rediscover fulfilling lives, rewarding relationships, and meaningful work. This book will give unprecedented hope to patients and their families.

Raw and Natural Nutrition for Dogs, Revised Edition: The Definitive Guide to Homemade Meals


Lew Olson - 2010
    The book includes charts with the recipes, instructions on keeping diets simple and balanced, guidelines on preparation, suggestions for finding ingredients, and how much to feed a dog by body weight. There are recipes for healthy adult dogs, as well as guidelines for puppies, senior dogs, and dogs with health conditions including pancreatitis, renal problems, gastric issues, allergies, heart disease, liver disease, and cancer.Tracing the history of feeding dogs, the author shows when commercial dog food rose and took hold of the market. She discusses canine nutritional needs and provides research on how home-prepared foods can meet pets' needs better than commercial, processed dog food. Written with thorough information for the seasoned raw feeder, this guide can also be easily followed by any newcomer to home-feeding.This revised edition includes new information on special care and feeding of pregnant, newborn, performance, and toy breed dogs as well as senior dog considerations and the safety of the raw food diet for dogs.From the Trade Paperback edition.

Math Riddles For Smart Kids: Math Riddles and Brain Teasers that Kids and Families will Love


M. Prefontaine - 2017
    It is a collection of 150 brain teasing math riddles and puzzles. Their purpose is to make children think and stretch the mind. They are designed to test logic, lateral thinking as well as memory and to engage the brain in seeing patterns and connections between different things and circumstances. They are laid out in three chapters which get more difficult as you go through the book, in the author’s opinion at least. The answers are at the back of the book if all else fails. These are more difficult riddles and are designed to be attempted by children from 10 years onwards, as well as participation from the rest of the family. Tags: Riddles and brain teasers, riddles and trick questions, riddles book, riddles book for kids, riddles for kids, riddles for kids aged 9-12, riddles and puzzles, jokes and riddles, jokes book, jokes book for kids, jokes children, jokes for kids, jokes kids, puzzle book

What If?: Randall Munroe | Serious Scientific Answers to Absurd Hypothetical Questions | Summary & Takeaways


Brief Books - 2015
     This book is a supplement to What If? and intended to enhance the experience of reading the original book. We recommend purchasing the full version of What If? on Amazon in addition to this book. Introduction What If? Serious Scientific Answers to Absurd Hypothetical Questions presents a wide variety of questions covering a range of dubious potentialities and the results which would ensue should they become reality. The questions are collected from author Randall Munroe’s website, where they are sent in by readers of his blog. Some of the questions are conceptual, for example how much force would be required for Yoda to lift an X-fighter, others are in a more serious vein. All of the answers however are based on research and the application of scientific principles by the author, himself trained in physics and a former roboticist for NASA. Benefits Spend less time reading and more time enjoying your favorite books. Discover important details you may have missed the first time. Review key concepts in an easy-to-understand and efficient manner. Use as a reference or "cheat sheet" to quickly access important information. Pick up where you left off with the original book. Focus only on critical information and eliminate unnecessary details. Buy Now Buy Now: Only $2.99 (Save $3.00 or 50%, Regular Price: $5.99) Money Back Guarantee: If you are not 100% satisfied with your purchase, simply return it to Amazon within 7 days of purchase for a full refund. Go to Your Account -> Manage Your Content and Devices -> Find the Book -> Return for Full Refund. Read Now: Your book will be delivered to your Kindle device or free Kindle software automatically.

Endless Perfect Circles: Lessons from the little-known world of ultradistance cycling


Ian Walker - 2020
    

Being Mortal by Atul Gawande - A 20-minute Summary: Medicine and What Matters in the End


Instaread Summaries - 2014
    Being Mortal by Atul Gawande - A 20-minute Summary Inside this Instaread Summary: • Overview of the entire book• Introduction to the important people in the book• Summary and analysis of all the chapters in the book• Key Takeaways of the book• A Reader's Perspective Preview of this summary: Chapter 1 Gawande grew up in Ohio. His parents were immigrants from India and both were doctors. His grandparents stayed in India, and there were few older people in his neighborhood, so he had little experience with aging or death until he met his wife’s grandmother, Alice Hobson. Hobson was seventy-seven and living on her own in Virginia. She was a spirited widow who fixed her own plumbing and volunteered with Meals On Wheels. However, Hobson was losing strength and height steadily each year as her arthritis worsened.Gawande’s father enthusiastically adopted the customs of his new country, but he could not understand the way in which seniors were treated in the US. In India, the elderly were treated with great respect and lived out their lives with family.In the United States, Sitaram Gawande, Gawande’s grandfather, likely would have been sent to a nursing home like most of the elderly who cannot handle the basics of daily living by themselves. However, in India, Sitaram Gawande was able to live in his own home and manage his own affairs, with family constantly around him. He died at the age of one hundred and ten when he fell off a bus during a business trip.Until recently, most elderly people stayed with their families. Even as the nuclear family unit became predominant, replacing the multi-generational family unit, people cared for their elderly relatives. Families were large and one child, usually a daughter, would not marry in order to take care of the parents.This has changed in much of the world, where elderly people end up struggling to live alone, like Hobson, rather than living with dignity amid family, like Sitaram Gawande.One cause of this change can be found in the nature of knowledge. When few people lived to be very old, elders were honored. Their store of knowledge was greatly useful. People often portrayed themselves as older to command respect. Modern society’s emphasis on youth is a complete reversal of this attitude. Technological advances are perceived as the territory of the young, and everyone wants to be younger. High-tech job opportunities are all over the world, and young people do not hesitate to leave their parents behind to pursue them.In developed countries, parents embrace the concept of a retirement filled with leisure activities. Parents are happy to begin living for themselves once children are grown. However, this system only works for young, healthy retirees, but not for those who cannot continue to be independent. Hobson, for example, was falling frequently and suffering memory lapses. Her doctor did tests and wrote prescriptions, but did not know what to do about her deteriorating condition. Neither did her family… About the Author With Instaread Summaries, you can get the summary of a book in 30 minutes or less. We read every chapter, summarize and analyze it for your convenience.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

Freshwater Aquariums for Dummies


Maddy Hargrove - 2006
    This friendly guide answers all your questions, from setting up your tank and selecting fish to the water, chemicals, plants, and much more. There's also expanded guidance on combining different species of fish, maintaining a tank, cleaning gravel, and dealing with common problems such as algae. Discover how to * Choose the right aquarium * Select the best fish * Get good deals on equipment * Maintain a clean, healthy environment * Handle tank pitfalls * Breed your fish

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Mars Direct: Space Exploration, the Red Planet, and the Human Future: A Special from Tarcher/Penguin


Robert Zubrin - 2013
    In the coming years, we will make decisions regarding our human spaceflight program that will lead to one of two familiar futures: the open universe of "Star Trek, "where we allow ourselves the opportunity to spread our wings and attempt to flourish as an interplanetary species--or the closed, dystopian, and ultimately self-destructive world of "Soylent Green." If we ever hope to live in the future that is the former scenario, our first stepping stone must be a manned mission to Mars. In this four-part e-special, Dr. Robert Zubrin details the challenges of a manned Earth-to-Mars mission. Challenges which, according to Zubrin, we are technologically more prepared to overcome than the obstacles of the missions to the moon of the sixties and seventies. Dr. Zubrin's relatively simple plan, called Mars Direct, could feasibly have humans on the surface of Mars within a decade. Zubrin also discusses the current predicament of NASA, the promise of privatized space flight from companies like SpaceX, and the larger implication behind the absolute necessity to open the final frontier to humanity--the human race's future as a species that takes the necessary baby steps away from the cradle that is planet Earth or, ultimately, perishes here.