Book picks similar to
Mastering Node.js by T.J. Holowaychuk
javascript
free
may-read
programming
Manly Crafts
Instructables.com - 2011
Learn how to make a 5-cent wedding band, leather iPod case, and paracord bullwhip!
This Book Wants You To Sleep - A Fun Early Reader Story Book for Toddlers, Preschool, Kindergarten and 1st Graders: An Interactive, Simple, Easy to Read Tale for Children for Kids ages 2 to 5
Elisa Anderson - 2021
The Elephants and the Chocolate Cake
Balachander Vijayakumar
But they just cannot seem to find a cake that's big enough for elephants. The elephants need to find a way out to arrange a cake for their friend's birthday.'The Elephants and the Chocolate Cake' is the story of three lovable characters that solve a problem by thinking out of the box. The story is easy to follow and the lovely, bright illustrations keep children engaged to the story. The book has all the right elements that children love - a birthday, a huge chocolate cake, and some cute elephants!The book also starts off with a subtle hint to the readers that while everybody is slightly different from one another, they can be great friends and care for one another.Perfect for children aged 2, 3, 4, 5, and 6.
Cowboy Justice Association Novel Box Set: Books 4 - 6
Olivia Jaymes - 2016
Fishing – alone - on a serene and sunny afternoon is one of his favorite things to do. So is coming home to a place that isn’t littered with cosmetics, clothes, and panties. Jazz Oliver wants to be a star. Down and out and deep in debt, she’s desperate for money and a big break. It’s the only reason she’s allowed herself to be signed up as a contestant on a reality show in some backwater town in Montana. From their first meeting, the attraction simmers between the sheriff and the Hollywood starlet. But when casual, naughty fun turns into something more, Griffin is stumped as to what to do. Having spent most of his adult life keeping women at arm’s length, he doesn’t know how to get one to stay. He needs to find a way to convince her – and himself – that he’s finally ready to share everything. Even the remote control. Cowboy Cool:Sheriff Reed Mitchell is a workaholic on a forced vacation. He just has one quick stop on the way. He promised Logan Wright he’d check on Kaylee Blue who has been receiving creepy emails from a stalker. Kaylee thinks Ava and Logan are worried over nothing. As the writer of erotic romance, she gets strange mail every now and then. But nothing goes as planned… Kaylee’s stalker raises the stakes and Reed is forced to put his vacation on hold. Despite Kaylee’s protests that she can handle things on her own, she’s relieved Reed is determined to protect her. But living together is rapidly turning into something else. Something real. Reed hasn’t cared about a blessed thing in the last fifteen years except work and he’s not planning to change. Will he be able to turn and leave this woman when it’s time to go? Imperfect Justice:Born into a prominent ranching family and brought up in a disciplined household, Sheriff Jared Monroe has high standards of how to live his life and he doesn’t hesitate to hold the people around him to the same accountability. Misty Foster is a girl from the wrong side of the tracks. Her mother slept her way through the men in town and everyone thinks Misty has followed in her mother’s footsteps. If they knew the truth they’d be more than shocked. One blustery, snowy night Jared and Misty do something completely uncharacteristic—they throw caution to the wind and fan the flames of their passion. Now there’s a third person to consider. An innocent baby is on the way and when Jared finds out, he instantly steps forward to do the right thing. Unfortunately, Misty doesn’t agree with his future plans. What’s a no nonsense sheriff to do now that he’s met his match?
JavaScript Bible
Danny Goodman - 1996
Part tutorial and part reference, the book serves as a learning tool for building new JavaScript skills and a detailed reference for seasoned JavaScript developers. Danny Goodman's exclusive interactive workbench, The Evaluator, makes it easy to master JavaScript and DOM concepts. Offers deployment strategies that best suit the user's content goals and target audience.Bonus CD-ROM is packed with advanced content for the reader who wants to go an extra step.
CCNA: Cisco Certified Network Associate Study Guide [Exam 640-801]
Todd Lammle - 2000
This Study Guide was developed to meet the exacting requirements of today's Cisco certification candidates. In addition to the engaging and accessible instructional approach that has earned author Todd Lammle the "Best Study Guide Author" award in CertCities Readers' Choice Awards for two consecutive years, this updated fifth edition provides:In-depth coverage of every CCNA exam objective Expanded IP addressing and subnetting coverage More detailed information on EIGRP and OSPF Leading-edge exam preparation software Authoritative coverage of all exam objectives, including:Network planning & designing Implementation & operation LAN and WAN troubleshooting Communications technology
Refactoring to Patterns
Joshua Kerievsky - 2004
In 1999, "Refactoring" revolutionized design by introducing an effective process for improving code. With the highly anticipated " Refactoring to Patterns ," Joshua Kerievsky has changed our approach to design by forever uniting patterns with the evolutionary process of refactoring.This book introduces the theory and practice of pattern-directed refactorings: sequences of low-level refactorings that allow designers to safely move designs to, towards, or away from pattern implementations. Using code from real-world projects, Kerievsky documents the thinking and steps underlying over two dozen pattern-based design transformations. Along the way he offers insights into pattern differences and how to implement patterns in the simplest possible ways.Coverage includes: A catalog of twenty-seven pattern-directed refactorings, featuring real-world code examples Descriptions of twelve design smells that indicate the need for this book s refactorings General information and new insights about patterns and refactoringDetailed implementation mechanics: how low-level refactorings are combined to implement high-level patterns Multiple ways to implement the same pattern and when to use each Practical ways to get started even if you have little experience with patterns or refactoring"Refactoring to Patterns" reflects three years of refinement and the insights of more than sixty software engineering thought leaders in the global patterns, refactoring, and agile development communities. Whether you re focused on legacy or greenfield development, this book will make you a better software designer by helping you learn how to make important design changes safely and effectively. "
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Python for Informatics: Exploring Information: Exploring Information
Charles Severance - 2002
You can think of Python as your tool to solve problems that are far beyond the capability of a spreadsheet. It is an easy-to-use and easy-to learn programming language that is freely available on Windows, Macintosh, and Linux computers. There are free downloadable copies of this book in various electronic formats and a self-paced free online course where you can explore the course materials. All the supporting materials for the book are available under open and remixable licenses. This book is designed to teach people to program even if they have no prior experience.
Ahead in the Cloud: Best Practices for Navigating the Future of Enterprise IT
Stephen Orban - 2018
It has made countless new businesses possible and presents a massive opportunity for large enterprises to innovate like startups and retire decades of technical debt. But making the most of the cloud requires much more from enterprises than just a technology change. Stephen Orban led Dow Jones’s journey toward digital agility as their CIO and now leads AWS’s Enterprise Strategy function, where he helps leaders from the largest companies in the world transform their businesses. As he demonstrates in this book, enterprises must re-train their people, evolve their processes, and transform their cultures as they move to the cloud. By bringing together his experiences and those of a number of business leaders, Orban shines a light on what works, what doesn’t, and how enterprises can transform themselves using the cloud.
Tampa Bait
Edgar Winner - 2012
Because if you do, you may find out what happens when a former cop with a gun and nothing to lose decides to push back
97 Things Every Programmer Should Know: Collective Wisdom from the Experts
Kevlin Henney - 2010
With the 97 short and extremely useful tips for programmers in this book, you'll expand your skills by adopting new approaches to old problems, learning appropriate best practices, and honing your craft through sound advice.With contributions from some of the most experienced and respected practitioners in the industry--including Michael Feathers, Pete Goodliffe, Diomidis Spinellis, Cay Horstmann, Verity Stob, and many more--this book contains practical knowledge and principles that you can apply to all kinds of projects.A few of the 97 things you should know:"Code in the Language of the Domain" by Dan North"Write Tests for People" by Gerard Meszaros"Convenience Is Not an -ility" by Gregor Hohpe"Know Your IDE" by Heinz Kabutz"A Message to the Future" by Linda Rising"The Boy Scout Rule" by Robert C. Martin (Uncle Bob)"Beware the Share" by Udi Dahan
Bottomless Cups
Joel Bresler - 2020
What began as a mutual interest in sneak-reading comic books in class evolved into a friendship which has outlasted a great many Presidents and a whole lot more, besides.Teddy and Ray, along with two other boys, formed the core of a group of kids who did everything together. As teenagers, they discovered that restaurants gave free coffee refills even if you didn't order anything else, leading to a lifetime's worth of bottomless cups and frustrated restaurant owners. Now in advanced age, Teddy and Ray still meet regularly to drink too much coffee and talk about the things old guys usually tend to talk about. In between, they flash back to various times and events which helped shape their lives.One of their once-close group, who has enjoyed a modestly successful career in Hollywood, comes up with the idea of making a movie about their youthful experiences together and what came after for each of them. This would, of course, include starring the surviving originals as the present-day versions of their cinematic selves. For some, however, facing their past, present and inevitable future all in one sitting proves considerably more difficult than it looks on the silver screen.
Network Security: Private Communication in a Public World
Charlie Kaufman - 1995
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.