User Interface Design for Programmers


Joel Spolsky - 2001
    They think that UI design is like graphic design--the mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers instead--strong at reasoning, weak on artistic judgment, and incapable of doing UI design.In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple.In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading User Interface Design for Programmers, you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works."

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Rules Free VRMMO Life: Omnibus I (Volumes 1-4) (VRMMO Life Omnibus)


Stuart Grosse - 2017
    Age of Anarchy Online (AAO) is the newest game released by Icestorm, makers of the legendary World of Destiny (WoD). Unlike VR games before it, AAO promises a 110% 'Better Than Life' realism experience, and to showcase this, Icestorm announces that AAO will have no 'Out of Character' rules, save for actions like hacking or exploiting system errors. Players can do anything to NPCs and even other players, and there will be no consequences save what one may suffer in game. "Do what thou wilt, but it may be done to you in turn." Mike Greene, better known in WoD as Torgan, a max level Paladin and leader of the Lords of Light, one of the top 'light side' guilds in WoD, now sets off on a new adventure in AAO. -------------------- Author's Note: If you haven't guessed, there's going to be all kinds of nastiness in this story. Violence, language, racism, sexism, sex, gore, vore, and more! If you have triggers of any kind, this is your warning. If you're looking for a nice, heartwarming tale like Sword Art Online, keep looking. There will be 'good guys' as well, but this is a story where Might IS Right. However, if you've read Watchmen and Wanted, and like what you read (READ, not the movies!), then you just may find this story in your strike zone. And for f*ck's sake, this is just a story! Don't take this as an endorsement of any of the actions in this story. **This is an omnibus edition containing the first four volumes of Rules-Free VRMMO Life.**

Excel 2007 VBA Programming for Dummies


John Walkenbach - 1996
    Packed with plenty of sample programs, it explains how to work with range objects, control program flow, develop custom dialog boxes, create custom toolbars and menus, and much more.Discover how toGrasp essential programming concepts Use the Visual Basic Editor Navigate the new Excel user interface Communicate with your users Deal with errors and bugs

jQuery Pocket Reference


David Flanagan - 2010
    This book is indispensable for anyone who is serious about using jQuery for non-trivial applications." -- Raffaele Cecco, longtime developer of video games, including Cybernoid, Exolon, and StormlordjQuery is the "write less, do more" JavaScript library. Its powerful features and ease of use have made it the most popular client-side JavaScript framework for the Web. This book is jQuery's trusty companion: the definitive "read less, learn more" guide to the library.jQuery Pocket Reference explains everything you need to know about jQuery, completely and comprehensively. You'll learn how to:Select and manipulate document elementsAlter document structureHandle and trigger eventsCreate visual effects and animationsScript HTTP with Ajax utilitiesUse jQuery's selectors and selection methods, utilities, plugins and moreThe 25-page quick reference summarizes the library, listing all jQuery methods and functions, with signatures and descriptions.

By His Grace


Kathleen Wiseman - 2012
    Now she has returned home to southern California from England due to her father's illness and intends to avoid Daniel at all costs. This proves to be more difficult than she thought, and his attempts to speak to Grace are thwarted by the beautiful Courtney. The dubious Jason Highfield is added to the mix. By His Grace is a sweet romance.<br><br>GOODREADS REVIEW<br>Savannah (Books With Bite)'s review <br>May 09, 12<br>Love. Love. Love. Finally a real romance without lusty sex. A good Christian romance about God's love and grace. I adored that this book is realistic. People are not perfect. We make mistakes. And the Lord is the only one who can help us. I loved that this book isn't overly preachy either. It just plain ol' God's love with a nice touch of romance. I can't wait to read the next book. <br><br>NOW AVAILABLE! BOOK FOUR: A Mustard Seed.<br>IN THIS SERIES:<br>BOOK ONE: By His Grace.<br>BOOK TWO: Caroline's Gift.<br>BOOK THREE: That Which Is Secret.<br>BOOK FOUR: A Mustard Seed.

PHP 6 and MySQL 5 for Dynamic Web Sites: Visual Quickpro Guide


Larry Ullman - 2007
    With step-by-step instructions, complete scripts, and expert tips to guide readers, this work gets right down to business - after grounding readers with separate discussions of first the scripting language (PHP) and then the database program (MySQL), it goes on to cover security, sessions and cookies, and using additional Web tools.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

How to Count (Programming for Mere Mortals, #1)


Steven Frank - 2011
    unsigned numbers- Floating point and fixed point arithmeticThis short, easily understood book will quickly get you thinking like a programmer.

Computer Graphics with OpenGL


Donald Hearn - 2003
    The text converts all programming code into the C++ language.

Dom Scripting: Web Design with JavaScript and the Document Object Model


Jeremy Keith - 2005
    This is a book for web designers. Specifically, this book is intended for standards-aware designers who are comfortable using CSS and XHTML. If that sounds like you, read on... This book is made up of equal parts code and concepts. Don't be frightened by the code: I know it might look intimidating at first, but once you've grasped the concepts behind the code, you'll find yourself reading and writing in a new language. Learning a programming language might seem like a scary prospect, but it needn't be. DOM Scripting might appear to be more verbose than, say, CSS, but once you've got the hang of the syntax, you'll find yo- self armed with a powerful web development tool. In any case, the code is there simply to illustrate the concepts. I'll let you in on a secret: nobody memorizes all the syntax and keywords that are part and parcel of any programming language. That's what reference books are for. This isn't a reference book. I'm going to cover the bare minimum of syntax required to get up and running with JavaScript. I'm really going to focus on the ideas behind DOM Scripting. A lot of these ideas might already be familiar to you: graceful degradation, progressive enhancement, and user-centered design are important concepts in any aspect of front-end web development.

Digital Adaptation


Paul Boag - 2014
    That's why we created Digital Adaptation, a new practical book on how to help senior management understand the Web and adapt the business, culture, teams and workflows accordingly. No fluff, no theory — just techniques and strategies that worked in practice, and showed results. The book will help traditional businesses and organizations to overcome their legacy, and help you plant the seeds of change with very little power. If you do want to finally see changes happening, this is the book to grab. Written by Paul Boag. Designed by Veerle Pieters. 176 pages. YOU'LL LEARN TO: • Tackle bureaucracy and overcome legacy culture, • Develop a flexible and effective digital strategy, • Use responsibility matrix to minimize delays and costs, • Adopt a digital culture and become digital by default, • Apply techniques from mid-sized and large organizations, • Avoid toxic working practices and improve internal processes, • Organize teams and boost their efficiency, • Embrace social media and use them effectively, • Understand the value of a digital team and invest in them, • Break down the walls and nourish collaboration, ownership and innovation.

Gray Mountain: by John Grisham | Summary & Analysis


Book*Sense - 2014
    Grisham's twenty-second legal thriller takes readers from the sky-scrapers of high-powered New York law firms to the dusty offices of a free legal clinic in small-town Virginia. Gray Mountain is both an exciting story of murder and intrigue and a thoughtful examination of the effects of the coal industry on life in Appalachia. Grisham's tight plotting, wry humor and three-dimensional characters bring the legal profession to life. Gray Mountain begins in the tempestuous, nerve-wracking and paranoid atmosphere of Manhattan set in the confusing months after the economic blow-out in 2008. We see the offices with their ignored vistas, the busy, dirty sidewalks, the cramped apartments shared by young professionals. After a brief sojourn in her hometown of Washington, D.C., protagonist Samantha, along with the story, heads for rural Virginia. Most of the novel takes place in the small town of Brady, Virginia, which is poor and somewhat down-at-heel. You also get the following in this Summary & Analysis of Gray Mountain: • Detailed Book Review from Experts • Story Setting Analysis of Gray Mountain • Gray Mountain Plot Analysis that will make you see the book from another angle. • Pick up bits you might have missed as we decipher the novel. • Details of Characters & Key Character Analysis • Summary of the text, with some analytical comments interspersed • Discussion & Analysis of Themes, Symbols… • And Much More! This Analysis of Gray Mountain fills the gap, making you understand more while enhancing your reading experience.

Gray Man: Camouflage for Crowds, Cities, and Civil Crisis


Matthew Dermody - 2017
    He hides in the corners of conformity. He only flaunts a quotidian nature. He meanders through the mundane and occupies the ordinary. Individual expression and exceptionalism are his enemies. The Gray Man is the forgettable face, the ghost guy, the hidden human. Implementing the concepts is more than looking less tactical, less hostile, or less threatening. It is the willful abandonment of anything and everything that defines oneself as different. Using his unique "S" word conceptual approach featured in Appear to Vanish, camouflage and concealment expert Matthew Dermody discusses the concepts, tactics and mindset necessary to assimilate into any urban environment. From the safety-conscious international traveler to the SERE contingencies of the deep cover foreign operative, GRAY MAN is the definitive urban concealment resource.

Programming in Go: Creating Applications for the 21st Century


Mark Summerfield - 2012
    With this guide, pioneering Go programmer Mark Summerfield shows how to write code that takes full advantage of Go's breakthrough features and idioms. Both a tutorial and a language reference, "Programming in Go" brings together all the knowledge you need to evaluate Go, think in Go, and write high-performance software with Go. Summerfield presents multiple idiom comparisons showing exactly how Go improves upon older languages, calling special attention to Go's key innovations. Along the way, he explains everything from the absolute basics through Go's lock-free channel-based concurrency and its flexible and unusual duck-typing type-safe approach to object-orientation. Throughout, Summerfield's approach is thoroughly practical. Each chapter offers multiple live code examples designed to encourage experimentation and help you quickly develop mastery. Wherever possible, complete programs and packages are presented to provide realistic use cases, as well as exercises. Coverage includes:-- Quickly getting and installing Go, and building and running Go programs -- Exploring Go's syntax, features, and extensive standard library -- Programming Boolean values, expressions, and numeric types -- Creating, comparing, indexing, slicing, and formatting strings -- Understanding Go's highly efficient built-in collection types: slices and maps -- Using Go as a procedural programming language -- Discovering Go's unusual and flexible approach to object orientation -- Mastering Go's unique, simple, and natural approach to fine-grained concurrency -- Reading and writing binary, text, JSON, and XML files -- Importing and using standard library packages, custom packages, and third-party packages -- Creating, documenting, unit testing, and benchmarking custom packages