The Battle of $9.99: How Apple, Amazon, and the Big Six Publishers Changed the E-Book Business Overnight


Andrew Richard Albanese - 2013
    This blow-by-blow account charts how five of America’s six largest publishers, afraid that bookselling powerhouse Amazon's $9.99 price for Kindle e-books would undermine the industry, spent a few frantic weeks in early 2010 deep in negotiations with Apple to introduce a new business model for e-books, just in time for the launch of the iPad and the iBookstore. The catch is, it all may have been illegal.From Publishers Weekly senior writer Andrew Richard Albanese comes the story of how the e-book business changed in a heartbeat. Based on voluminous evidence gathered for Apple's trial, it is the story of how corporate titans fought it out behind the scenes and why the case matters to anyone who has ever bought an e-book.

Training Kit (Exam 70-461): Querying Microsoft SQL Server 2012


Itzik Ben-Gan - 2012
    Work at your own pace through a series of lessons and practical exercises, and then assess your skills with practice tests on CD—featuring multiple, customizable testing options.Maximize your performance on the exam by learning how to:Create database objectsWork with dataModify dataTroubleshoot and optimize queriesYou also get an exam discount voucher—making this book an exceptional value and a great career investment.

The Software Paradox


Stephen O’Grady - 2015
    

Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications


William Penberthy - 2013
    Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Design the application architectureDesign the user experienceDevelop the user experienceTroubleshoot and debug web applicationsDesign and implement securityThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)

Computer Networks and Internets [With CDROM and Companion Website Access Code Card]


Douglas E. Comer - 1996
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.

The Anger of Aubergines


Bulbul Sharma - 1997
    Women weigh up the loss of a lover, or the loss of weight; they consider whether hunger or the thought of higher things are inextricably linked; they feast and die for their insatiable appetites.

Advanced Computer Architecture: Parallelism, Scalability, Programmability


Kai Hwang - 1992
    It deals with advanced computer architecture and parallel processing systems and techniques, providing an integrated study of computer hardware and software systems, and the material is suitable for use on courses found in computer science, computer engineering, or electrical engineering departments.

iPad: The Missing Manual


J.D. Biersdorfer - 2010
    That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.

New Additional Mathematics


Ho Soo Thong
    

ഉത്തർഖണ്ഡിലൂടെ: കൈലാസ്-മാനസസരസ്സ് യാത്ര [Uttarakhandiloode: Kailas-Mansasarassu Yatra]


M.K. Ramachandran - 2003
    Ramachandran won the Kerala State Sahitya Akademi (Kerala State Literature)award in 2005 for his first book `Uttarakhandiloode: Kailas-Mansasarassu Yatra',book on a trek to Mount Kailas through the tricky Uttarakhand rangesSri M K Ramachandran dedicatated his life completely to dangerous Himalayan travel, perhaps the only pilgrim who visited all five Kailash ,called "Panch Kailash" .These are Kailash Manasarovar, Adi Kailash, Kinnaur Kailash, Shrikant Mahadev Kailash and Manimahesh Kailash. He is one of the best selling travelogue writer in kerala ,India. His way of writings with the myths, reality and mystical experiences about his ineffable pilgrimages are truly amazing and has attracted millions of fans. His mystical experiences, such as encounters with Divya Yogis and Yoginis deep inside Himalayas are telling to the world that there are many facts that are unexplainable through modern sciences and logic . He has already covered 64 different destinations in Himalaya. Each one of his travel consist of days of research , preparation, arrangement, lonely dangerous trekking through Himalayan glaciers . For example 35 days of trekking is needed for Srikand mahadave kilash darshan. Welcome to the world of amazing Himalaya mystical Explorations .........,

Student Solutions Guide For Discrete Mathematics And Its Applications


Kenneth H. Rosen - 1988
    These themes include mathematical reasoning, combinatorial analysis, discrete structures, algorithmic thinking, and enhanced problem-solving skills through modeling. Its intent is to demonstrate the relevance and practicality of discrete mathematics to all students. The Fifth Edition includes a more thorough and linear presentation of logic, proof types and proof writing, and mathematical reasoning. This enhanced coverage will provide students with a solid understanding of the material as it relates to their immediate field of study and other relevant subjects. The inclusion of applications and examples to key topics has been significantly addressed to add clarity to every subject. True to the Fourth Edition, the text-specific web site supplements the subject matter in meaningful ways, offering additional material for students and instructors. Discrete math is an active subject with new discoveries made every year. The continual growth and updates to the web site reflect the active nature of the topics being discussed. The book is appropriate for a one- or two-term introductory discrete mathematics course to be taken by students in a wide variety of majors, including computer science, mathematics, and engineering. College Algebra is the only explicit prerequisite.

The LogStash Book


James Turnbull - 2013
    We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Ray Tracing in One Weekend (Ray Tracing Minibooks Book 1)


Peter Shirley - 2016
    Each mini-chapter adds one feature to the ray tracer, and by the end the reader can produce the image on the book cover. Details of basic ray tracing code architecture and C++ classes are given.

The Mobile Mind Shift: Engineer Your Business To Win in the Mobile Moment


Ted Schadler - 2014
    What’s tomorrow’s weather? Is the flight on time? Where’s the nearest store, and is this product cheaper there? Whatever the question, the answer is on the phone. This Pavlovian response is the mobile mind shift — the expectation that I can get what I want, anytime, in my immediate context. Your new battleground for customers is this mobile moment — the instant in which your customer is seeking an answer. If you’re there for them, they’ll love you; if you’re not, you’ll lose their business. Both entrepreneurial companies like Dropbox and huge corporations like Nestlé are winning in that mobile moment. Are you?Based on 200 interviews with entrepreneurs and major companies across the globe, The Mobile Mind Shift is the first book to explain how you can exploit mobile moments. You’ll learn how to:•    Find your customer’s most powerful mobile moments with a mobile moment audit.•    Master the IDEA Cycle, the business discipline for exploiting mobile. Align your business and technology teams in four steps: Identify, Design, Engineer, Analyze.•    Manufacture mobile moments as Krispy Kreme does — it sends a push notification when hot doughnuts are ready near you. Result: 500,000 app downloads, followed by a double-digit increase in same-store sales.•    Turn one-time product sales into ongoing services and engagement, as the Nest thermostat does. And master new business models, as Philips and Uber do. Find ways to charge more and create indelible customer loyalty.•    Transform your technology into systems of engagement. Engineer your business and technology systems to meet the ever-expanding demands of mobile. It’s how Dish Network not only increased the efficiency of its installers but also created new on-the-spot upsell opportunities.Mobile is rapidly shifting your customers into a new way of thinking. You’ll need your own mobile mind shift to respond.