Book picks similar to
Engineering Analysis with ANSYS Software by Y. Nakasone
engineering
fiction
electronic
simulation
Hatching Twitter: A True Story of Money, Power, Friendship, and Betrayal
Nick Bilton - 2013
In barely six years, a small group of young, ambitious programmers in Silicon Valley built an $11.5 billion business out of the ashes of a failed podcasting company. Today Twitter boasts more than 200 million active users and has affected business, politics, media, and other fields in innumerable ways. Now Nick Bilton of the New York Times takes readers behind the scenes with a narrative that shows what happened inside Twitter as it grew at exponential speeds. This is a tale of betrayed friendships and high-stakes power struggles as the four founders—Biz Stone, Evan Williams, Jack Dorsey, and Noah Glass—went from everyday engineers to wealthy celebrities, featured on magazine covers, Oprah, The Daily Show, and Time’s list of the world’s most influential people. Bilton’s exclusive access and exhaustive investigative reporting—drawing on hundreds of sources, documents, and internal e-mails—have enabled him to write an intimate portrait of fame, influence, and power. He also captures the zeitgeist and global influence of Twitter, which has been used to help overthrow governments in the Middle East and disrupt the very fabric of the way people communicate.
A Fine Day for Revenge: A Historical Western Adventure Book
Ethan Westfield - 2021
The day his stepfather dies, however, his world will suddenly turn upside down. Even though Shaun grows increasingly suspicious of his stepfather's death, believing that something treacherous has happened to him, no one wants to listen to his fears.Will Shaun manage to unravel the truth behind the enigmatic and shocking death?While Shaun is still haunted by the mysterious loss of his father, he will soon have to confront another daunting obstacle; his stepbrother Clayton's decision to sell the family ranch. Moreover, Shaun is allowed to keep one horse but must leave the ranch, never to return. With nothing to live for and no place to call home, Shaun crosses paths with a horse enthusiast. Little does he know that together they're about to change the rules of horseracing forever... Will Shaun finally have a chance to make his way in the world, or will his hostility toward his stepbrother destroy a chance at a new life and success?With Shaun's move to Prescott and start in horse racing, his life will finally begin to improve. Moreover, a beautiful and sophisticated woman will soon steal his heart. Nonetheless, ghosts from the past continue to pursue him and lead him down a dark path... Will Shaun be able to overcome the lies and deceit that could undermine his chance for a good future? Or will forces beyond his control rob him of his smile once and for all?An action-packed story, featuring complex and fascinating characters, and twists and turns that will take your breath away. A must-read for fans of Western action and romance.
Getting MEAN with Mongo, Express, Angular, and Node
Simon Holmes - 2015
You'll systematically discover each technology in the MEAN stack as you build up an application one layer at a time, just as you'd do in a real project.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyTraditional web dev stacks use a different programming language in every layer, resulting in a complex mashup of code and frameworks. Together, the MongoDB database, the Express and AngularJS frameworks, and Node.js constitute the MEAN stack--a powerful platform that uses only one language, top to bottom: JavaScript. Developers and businesses love it because it's scalable and cost-effective. End users love it because the apps created with it are fast and responsive. It's a win-win-win!About the BookGetting MEAN with Mongo, Express, Angular, and Node teaches you how to develop web applications using the MEAN stack. First, you'll create the skeleton of a static site in Express and Node, and then push it up to a live web server. Next, you'll add a MongoDB database and build an API before using Angular to handle data manipulation and application logic in the browser. Finally you'll add an authentication system to the application, using the whole stack. When you finish, you'll have all the skills you need to build a dynamic data-driven web application.What's InsideFull-stack development using JavaScriptResponsive web techniquesEverything you need to get started with MEANBest practices for efficiency and reusabilityAbout the ReaderReaders should have some web development experience. This book is based on MongoDB 2, Express 4, Angular 1, and Node.js 4.About the AuthorSimon Holmes has been a full-stack developer since the late 1990s and runs Full Stack Training Ltd.Table of ContentsPART 1 SETTING THE BASELINEIntroducing full-stack developmentDesigning a MEAN stack architecturePART 2 BUILDING A NODE WEB APPLICATIONCreating and setting up a MEAN projectBuilding a static site with Node and ExpressBuilding a data model with MongoDB and MongooseWriting a REST API: Exposing the MongoDB database to the applicationConsuming a REST API: Using an API from inside ExpressPART 3 ADDING A DYNAMIC FRONT END WITH ANGULARAdding Angular components to an Express applicationBuilding a single-page application with Angular: FoundationsBuilding an SPA with Angular: The next levelPART 4 MANAGING AUTHENTICATION AND USER SESSIONSAuthenticating users, managing sessions, and securing APIsAPPENDIXESInstalling the stackInstalling and preparing the supporting castDealing with all of the viewsReintroducing JavaScript - available online only
Wastewater Treatment Plants: Planning, Design, and Operation
Syed R. Qasim - 1985
The design should incorporate flexibility for dealing with seasonal changes, as well as long-term changes in wastewater quality and future regulations. Good planning and design, therefore, must be based on five major steps:characterization of the raw wastewater quality and effluent, pre-design studies to develop alternative processes and selection of final process train, detailed design of the selected alternative, contraction, and operation and maintenance of the completed facility. Engineers, scientists, and financial analysts must utilize principles from a wide range of disciplines: engineering, chemistry, microbiology, geology, architecture, and economics to carry out the responsibilities of designing a wastewater treatment plant. The objective of this book is to present the technical and nontechnical issues that are most commonly addressed in the planning and design reports for wastewater treatment facilities prepared by practicing engineers. Topics discussed include facility planning, process description, process selection logic, mass balance calculations, design calculations, and concepts for equipment sizing. Theory, design, operation and maintenance, trouble shooting, equipment selection and specifications are integrated for each treatment process. Thus delineation of such information for use by students and practicing engineers is the main purpose of this book.
Linux Bible
Christopher Negus - 2005
Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get startedThis practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.
Everything Is Going to Kill Everybody: The Terrifyingly Real Ways the World Wants You Dead
Robert Brockway - 2010
. . Everything Is Going to Kill Everybody is bringing panic back. Twenty illustrated, hilariously fear-inducing
essays reveal the chilling and very real experiments, dangerous emerging technologies, and terrifying natural disasters that soon could—or very nearly already did—bring about the end of humanity. In short, everything in here will kill you and everyone you love. At any moment. And nobody’s told you about it—until now: • Experiments in green energy like the HiPER, which uses massive lasers to create a tiny “contained” sun; it’s an idea that could save the world if it doesn’t consume us all in a fiery fusion reaction first. • Global disasters like the hypercane—a hurricane so large it could cover all of North America and shoot trailer parks into space!• Terrifying new developments in robotics like the EATR, which powers itself on meat—an invention in the running for “Worst Decision Made by Anybody.”
Computer Systems: A Programmer's Perspective
Randal E. Bryant - 2002
Often, computer science and computer engineering curricula don't provide students with a concentrated and consistent introduction to the fundamental concepts that underlie all computer systems. Traditional computer organization and logic design courses cover some of this material, but they focus largely on hardware design. They provide students with little or no understanding of how important software components operate, how application programs use systems, or how system attributes affect the performance and correctness of application programs. - A more complete view of systems - Takes a broader view of systems than traditional computer organization books, covering aspects of computer design, operating systems, compilers, and networking, provides students with the understanding of how programs run on real systems. - Systems presented from a programmers perspective - Material is presented in such a way that it has clear benefit to application programmers, students learn how to use this knowledge to improve program performance and reliability. They also become more effective in program debugging, because t
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
I Should Be So Lucky
Judy Astley - 2012
Her first husband, Marco, companion of her youth and father of her only child, left her when he realised he was gay. Her second, Rhys, ended his high-octane, fame-filled life by driving his Porsche into a wall. No wonder her family always believes she needs Looking After, and her friends think she really shouldn't be allowed out on her own...Which is why, at the age of thirty-nine, she finds herself shamefully back at home, living with Mum.Viola knows she has to take charge; she needs to get a life, and fast. With a stroppy teenage daughter, a demanding mother, and siblings who want to control her life for her, where is she going to turn?
Dissecting The Hack: The F0rb1dd3n Network
Jayson E. Street - 2009
One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack
UNIX and Linux System Administration Handbook
Evi Nemeth - 2010
This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against." -From the Foreword by Tim O'Reilly, founder of O'Reilly Media "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straightfoward information delivered in colorful and memorable fashion." -Jason A. Nunnelley"This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian The twentieth anniversary edition of the world's best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX(R) and Linux(R) System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems: Ubuntu(R) LinuxopenSUSE(R) LinuxRed Hat(R) Enterprise Linux(R)Oracle America(R) Solaris(TM) (formerly Sun Solaris)HP HP-UX(R)IBM AIX(R)
High Performance MySQL: Optimization, Backups, Replication & Load Balancing
Jeremy D. Zawodny - 2004
This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In "High Performance MySQL" you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup optionsStorage engines and table typesBenchmarkingIndexesQuery OptimizationApplication DesignServer PerformanceReplicationLoad-balancingBackup and RecoverySecurity
APIs: A Strategy Guide
Daniel Jacobson - 2011
Salesforce.com (more than 50%) and Twitter (more than 75% fall into this category. Ebay gets more than 8 billion API calls a month. Facebook and Google, have dozens of APIs that enable both free services and e-commerce, get more than 5 billion API calls each day. Other companies like NetFlix have expanded their service of streaming movies over the the web to dozens of devices using API. At peak times, more than 20 percent of all traffic is accounted for by Netflix through its APIs. Companies like Sears and E-Trade are opening up their catalogs and other services to allow developers and entrepreneurs to create new marketing experiences.
Making an API work to create a new channel is not just a matter of technology. An API must be considered in terms of business strategy, marketing, and operations as well as the technical aspects of programming. This book, written by Greg Brail, CTO of Apigee, and Brian Mulloy, VP of Products, captures the knowledge of all these areas gained by Apigee, the leading company in supporting the rollout of high traffic APIs.
The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution
Donald A. Norman - 1998
Alas, the computer industry thinks it is still in its rebellious teenage years, exulting in technical complexity. Customers want change. They are ready for products that offer convenience, ease of use, and pleasure. The technology should be invisible, hidden from sight.In this book, Norman shows why the computer is so difficult to use and why this complexity is fundamental to its nature. The only answer, says Norman, is to start over again, to develop information appliances that fit people's needs and lives. To do this companies must change the way they develop products. They need to start with an understanding of people: user needs first, technology last--the opposite of how things are done now.
No Way Out
Rylie Dark - 2022
The murder of her sister, still unsolved, plunged her life into grief and awakened a new power within her. Sometimes messages come from direct contact, other times in dreams. All of it feels like a curse—until Carly realizes she can harness her new skills to solve cases. But her abilities are unreliable, and Carly must use her brilliant mind to complete the puzzle—all while struggling to keep her secret from her colleagues.In a macabre and bizarre pattern, women who were in grief, recently mourning a loved-one, are turning up murdered themselves. One thing is clear: a serial killer is targeting them, and with local authorities stumped, FBI Special Agent Carly See will have to descend into a world of death to enter the killer’s mind—and save the next victim before it’s too late.But this killer is diabolical and always one step ahead, and Carly herself, leading the investigation, may not be as safe as she seems. In a game of cat and mouse, it will be a race to the finish as Carly struggles to figure out what these victims have in common—and who is next on his list.A page-turning thriller packed with twists and turns, secrets, and harrowing surprises you won’t see the CARLY SEE series is a mystery series that will have you on the edge of your seat, endearing you to a brilliant and unique new character and having you turning pages, bleary-eyed, late into the night.