PHP Cookbook


David Sklar - 2002
    With our Cookbook's unique format, you can learn how to build dynamic web applications that work on any web browser. This revised new edition makes it easy to find specific solutions for programming challenges.PHP Cookbook has a wealth of solutions for problems that you'll face regularly. With topics that range from beginner questions to advanced web programming techniques, this guide contains practical examples -- or "recipes" -- for anyone who uses this scripting language to generate dynamic web content. Updated for PHP 5, this book provides solutions that explain how to use the new language features in detail, including the vastly improved object-oriented capabilities and the new PDO data access extension. New sections on classes and objects are included, along with new material on processing XML, building web services with PHP, and working with SOAP/REST architectures. With each recipe, the authors include a discussion that explains the logic and concepts underlying the solution.

Embedded Android: Porting, Extending, and Customizing


Karim Yaghmour - 2011
    You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.

CSS Cookbook


Christopher Schmitt - 2004
    But first, you have to get past CSS theory and resolve real-world problems.For those all-too-common dilemmas that crop up with each project, "CSS Cookbook" provides hundreds of practical examples with CSS code recipes that you can use immediately to format your web pages. Arranged in a quick-lookup format for easy reference, the second edition has been updated to explain the unique behavior of the latest browsers: Microsoft's IE 7 and Mozilla's Firefox 1.5. Also, the book has been expanded to cover the interaction of CSS and images and now includes more recipes for beginning CSS users. The explanation that accompanies each recipe enables you to customize the formatting for your specific needs. With topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tables, this book is a must-have companion, regardless of your experience with Cascading Style Sheets.

Perl Cookbook


Tom Christiansen - 1998
    Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include: • Manipulating strings, numbers, dates, arrays, and hashes • Pattern matching and text substitutions • References, data structures, objects, and classes • Signals and exceptions • Screen addressing, menus, and graphical applications • Managing other processes • Writing secure scripts • Client-server programming • Internet applications programming with mail, news, ftp, and telnet • CGI and mod_perl programming • Web programmingSince its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether you're a novice or veteran Perl programmer, you'll find Perl Cookbook, 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic you'd want to know about. You can get by without having this book in your library, but once you've tried a few of the recipes, you won't want to.

Java Cookbook


Ian F. Darwin - 2001
    Whether you're new to Java programming and need something to bridge the gap between theory-laden reference manuals and real-world programs or you're a seasoned Java programmer looking for a new perspective or a different problem-solving context, this book will help you make the most of your Java knowledge. Packed with hundreds of tried-and-true Java recipes covering all of the major APIs from the 1.4 version of Java, this book also offers significant first-look recipes for the most important features of the new 1.5 version, which is in beta release. You get practical solutions to everyday problems, and each is followed by a detailed, ultimately useful explanation of how and why the technology works. Java Cookbook, 2nd Edition includes code segments covering many specialized APIs--like those for working with Struts, Ant and other new popular Open Source tools. It also includes expanded Mac OS X Panther coverage and serves as a great launching point for Java developers who want to get started in areas outside of their specialization. In this major revision, you'll find succinct pieces of code that can be easily incorporated into other programs. Focusing on what's useful or tricky--or what's useful and tricky--Java Cookbook, 2nd Edition is the most practical Java programming book on the market.

Introducing Windows Server 2012


Mitch Tulloch - 2012
    This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business.Based on beta software, this book provides the early, high-level information you need to begin preparing now for deployment and management. Topics include:Virtualization and cloud solutions Availability Provisioning and storage management Security and scalability Infrastructure options Server administration

And The Rock Cried Out


Ray Bradbury - 1953
    With American economic and military might eradicated, husband and wife become the unfortunate focus for years of subjugation and resentment.

Learning GraphQL: Declarative Data Fetching for Modern Web Apps


Eve Porcello - 2018
    With this practical guide, Alex Banks and Eve Porcello deliver a clear learning path for frontend web developers, backend engineers, and project and product managers looking to get started with GraphQL.You'll explore graph theory, the graph data structure, and GraphQL types before learning hands-on how to build a schema for a photo-sharing application. This book also introduces you to Apollo Client, a popular framework you can use to connect GraphQL to your user interface.Explore graph theory and review popular graph examples in use todayLearn how GraphQL applies database querying methods to the internetCreate a schema for a PhotoShare application that serves as a roadmap and a contract between the frontend and backend teamsUse JavaScript to build a fully functioning GraphQL service and Apollo to implement a clientLearn how to prepare GraphQL APIs and clients for production

Unauthorised Access: Physical Penetration Testing for IT Security Teams


Wil Allsopp - 2009
    IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.

Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell


Lee Holmes - 2007
    Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem

Programming Entity Framework: DbContext


Julia Lerman - 2011
    This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database

Moving Home


P.J. Fiala - 2018
    Then Kayden disappears during a routine gas stop, and JT is torn between going after the woman he loves, and protecting her daughter. The Devils are known to have the local law in their back pockets, so JT calls in reinforcements. Time is not on their side and the clock is ticking.Moving Home is the sixth book in the exciting Rolling Thunder series. If you like sizzling sex scenes, suspense and happy endings, you’ll love PJ Fiala’s page turning series. Moving Home is the wrap-up of JT and Kayden's story from Moving to You. While it is a stand-alone, you will enjoy it much more if you read Moving to You first.

Vertigo Resurrected: Hellblazer #1


Garth Ennis - 2010
    Next is a story from HELLBLAZER #245 and #246 by new superstars Jason Aaron (SCALPED) and Sean Murphy (JOE THE BARBARIAN) following a doomed documentary crew exploring the mystery behind what happened to Mucous Membrane – Constantine's former punk band.

Celebrity in Death / Delusion in Death 2-in-1 Collection


J.D. Robb - 2015
    D. Robb Celebrity in Death Her career in homicide has taken her into the darkest depths of New York City’s underground—and sometimes Lieutenant Eve Dallas feels more comfortable in those kinds of places than in the high-rise, high-society world of her billionaire husband, Roarke.But while she’s no party girl, she’s managing to have a reasonably good time at the celebrity-packed bash celebrating the debut of The Icove Agenda. This time it’s Eve, not Roarke, who’s a guest of honor, since the film is based on one of her famous cases. Her partner, Peabody, is practically giddy over rubbing shoulders with Hollywood royalty. Eve, on the other hand, is more likely to roll her eyes than have stars in them. But she has to admit it’s a little spooky seeing the actress playing her, who looks almost like her long-lost twin.Not as unsettling, though, as seeing K. T. Harris, the actress who plays Peabody—drowned in the lap pool on the roof of the director’s luxury building. Talented but rude, and widely disliked, K.T. had made an embarrassing scene during dinner. She clearly liked being the center of attention. Now she’s at the center of a crime scene—and Eve is more than ready to get out of her high heels and strap on her holster, to step into the role she was born to play: cop. Delusion in Death It was just another after-work happy-hour bar downtown, where business professionals unwound with a few drinks, complained about the boss, maybe hooked up with someone for the night. Until something went terribly wrong.At first it was just a friction in the air. The noise intensified. The crowd seemed oppressive. Some sharp words were exchanged, some pushing and shoving. Then the madness descended. And after twelve minutes of chaos and violence, eighty people lay dead.Eve Dallas is trying to sort out the inexplicable events. Surviving witnesses talk about seeing things—monsters and swarms of bees. They describe sudden, overwhelming feelings of fear and rage and paranoia. When forensics makes its report, the mass delusions make more sense: it appears the bar patrons were exposed to a cocktail of chemicals and illegal drugs that could drive people into temporary insanity—if not kill them outright. But that doesn’t explain who would unleash such horror—or why. Eve’s husband, Roarke, happens to own the bar, yet he’s convinced the attack wasn’t directed at him. It’s bigger than that.And if Eve can’t figure it out fast, it could happen again, anytime, anywhere. Because it’s airborne....

Deathwolf


Andy Smillie - 2012
    But the war will be decided by Morkai himself as he challenges the aliens' sinister leader to single combat.