The Story the Soldiers Wouldn't Tell: Sex in the Civil War


Thomas P. Lowry - 1994
    Based on area original sources, including the soldiers' jokes, songs, letters, and diaries.

UNIX in a Nutshell: A Desktop Quick Reference for System V Release 4 and Solaris 2.0


Daniel Gilly - 1992
    For all but the thorniest UNIX problems, this one reference should be all the documentation you need.The second edition of "UNIX in a Nutshell" starts with thorough coverage of System V Release 3. To that, we've added the many new commands that were added to Release 4 and additional commands that were added to Solaris 2.0.Contents include: All user and programmer commands.New Korn shell documentation.Expanded text editing section, including GNU Emacs and "nawk."Shell syntax ("sh" and "csh").Pattern-matching syntax."vi" and "ex" commands."sed" and "awk" commands."troff" and related commands and macros."sdb" and "dbx" commands.If you currently use either SVR3 or SVR4 or are planning to in the future, or if you're a Sun user facing the transition to Solaris, you'll want this book. "UNIX in a Nutshell" is the most comprehensive quickref on the market, a must for any UNIX user.

Microprocessors and Microcontrollers


N. Senthil Kumar - 2011
    It also touches upon the fundamentals of 32 bit, and 64 bit advanced processors. The book throughout provides the most popular programming tool - the assembly language codes to enhance the knowledge of programming the processors.Clear and concise in its treatment of topics, the contents of the book is supported by learning tools such as review questions, application examples (case studies) and design-based exercises.

You'll Win Nothing With Kids


Jim White - 2007
    You'll find Jim in the same place every week, failing to organise a bunch of lads into something resembling a team while on the far side of the park his opposite number, a wannabe Mourinho in brashly monogrammed tracksuit, struts the sidelines, shouting - always shouting. This is the hilarious story of Jim White's time as manager of his son's football team: the highs, the lows, and the dog turd in the centre circle. At this level, winning spirit is not so much about passion, pride and belief as praying that your star centre forward has remembered his boots. Most importantly, it's about the enduring relationship between fathers, sons and football. This is the story no one who has ever watched his or her child play sport will want to miss.

Game Programming Gems


Mark DeLoura - 2000
    But instead of spending hours and hours trying to develop your own answers, now you can find out how the pros do it! Game Programming Gems is a hands-on, comprehensive resource packed with a variety of game programming algorithms written by experts from the game industry and edited by Mark DeLoura, former software engineering lead for Nintendo of America, Inc. and now the newly appointed editor-in-chief of Game Developer magazine. From animation and artificial intelligence to Z-buffering, lighting calculations, weather effects, curved surfaces, mutliple layer Internet gaming, to music and sound effects, all of the major techniques needed to develop a competitive game engine are covered. Game Programming Gems is written in a style accessible to individuals with a range of expertise levels. All of the source code for each algorithm is included and can be used by advanced programmers immediately. For aspiring programmers, there is a detailed tutorial to work through before attempting the code, and suggestions for possible modifications and optimizations are included as well.

Serious Cryptography: A Practical Introduction to Modern Encryption


Jean-Philippe Aumasson - 2017
    You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

One Hot Boss


Ashlee Price - 2020
     Him… Elijah Johnson. As in the uber-wealthy owner of the agency. My boss. In my defense, I didn’t know who he was when I clumsily bumped into him. Um.…can you say instant attraction? His hotness practically exploding underneath the expensive suit. I’m just his employee. Not his girlfriend. Besides, I am forced to work with him if I want that promotion. Working with him is getting harder by the day though. He’s charming, powerful. But he’s no Mr. Perfect. He’s got skeletons in his closet. Our project is ending. It’s the perfect time to walk away. But why do I feel this burning desire to stick around. Can I trust my heart or will this flawed man break it?

Modern Operating Systems


Andrew S. Tanenbaum - 1992
    What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson

Using Docker


Adrian Mouat - 2015
    It guides you through the creation and deployment of a simple webapp, showing how Docker can be used at all stages, including development, testing and deployment.Other topics in this book include using Docker to provide a microservices architecture, how to best do service discovery, and how to bundle applications using Docker. You'll also get an overview of the large ecosystem that has sprung up around Docker, including the various PaaS offerings and configuration tools.

On Solid Ground


Quinn Anderson - 2017
    After months of saying hi in the elevator and making small talk at parties, they’re both dying to make a move. Too bad neither of them can work up the courage. Nerdy, risk-averse Chance is waiting for Kit to give him a sign, whereas Kit’s too afraid of being out in his professional life to date the cutie from IT. If only one of them could find the proper motivation, their shaky flirtation could become something real.Then an earthquake rocks their city. They band together to help others escape, until an aftershock leaves them trapped in a collapsing office building with little hope of survival. The very earthquake that brought them together could also tear them apart.Drunk on fear and adrenaline, passions run high, but how can they think about romance when any minute could be their last? They’ll have to face danger, themselves, and each other before they can get back on solid ground.

Hacking with Smart Phones


Trishneet Arora - 2015
    The language and tasks discussed in my former books are very complex. He asked me to write something basic that everyone can understand. So, I thought to write about Hacking with a Smartphones, a readily available tool to everyone in this 21st Century. Even a rickshaw driver today who earns hundred rupees a day owns a Smartphone. Understandably, none of us want our data to be hacked by a rickshaw driver, but the tricks and methods in this book have been explained so easily that even they can clench it. With the craze of e-shopping and net banking increasing the rate of cyber crime is increasing too. This book will tell you simple countermeasures about smart phones and digital security, they are simple but dangerous. Note: Don't expect big hacking techniques through this book, it may disappoint you. #hackinstagram #spyandroidmobile #whatsapphacking #iPhoneHacking

Java in a Nutshell


David Flanagan - 1996
    And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up.In this latest revision, readers will find "Java in a Nutshell," 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer.To wit, "Java in a Nutshell," 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with.This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, " Java in a Nutshell," 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, "Java in a Nutshell" has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.

Data Driven


D.J. Patil - 2015
    It requires you to develop a data culture that involves people throughout the organization. In this O’Reilly report, DJ Patil and Hilary Mason outline the steps you need to take if your company is to be truly data-driven—including the questions you should ask and the methods you should adopt. You’ll not only learn examples of how Google, LinkedIn, and Facebook use their data, but also how Walmart, UPS, and other organizations took advantage of this resource long before the advent of Big Data. No matter how you approach it, building a data culture is the key to success in the 21st century. You’ll explore: Data scientist skills—and why every company needs a Spock How the benefits of giving company-wide access to data outweigh the costs Why data-driven organizations use the scientific method to explore and solve data problems Key questions to help you develop a research-specific process for tackling important issues What to consider when assembling your data team Developing processes to keep your data team (and company) engaged Choosing technologies that are powerful, support teamwork, and easy to use and learn

Kissing the Alpha Boss: An Accidental Office Romance


Jillian Riley - 2019
     When I started my new job as the social media manager for Alchemy Enterprises, I had no idea who my sexy rich “American” management consultant was. There was something strange about the way he spoke. I felt drawn to him but thought he was hiding something. He is supposed to be American but he had an foreign accent. Something was off and I had to find out what it was. Even when I found out who he was I knew he was off limits but I couldn’t resist. Those eyes… that smile… I knew it was wrong, but it felt so right. . I knew I should stop…but could I?

Programming Android: Java Programming for the New Generation of Mobile Devices


Zigurd Mednieks - 2010
    With this book’s extensively revised second edition, you’ll focus on Android tools and programming essentials, including best practices for using Android 4 APIs. If you’re experienced with Java or Objective-C, you’ll gain the knowledge necessary for building well-engineered applications.Programming Android is organized into four parts:Part One helps programmers with some Java or iOS experience get off to a fast start with the Android SDK and Android programming basics.Part Two delves into the Android framework, focusing on user interface and graphics class hierarchies, concurrency, and databases. It’s a solid foundation for understanding of how the most important parts of an Android application work.Part Three features code skeletons and patterns for accelerating the development of apps that use web data and Android 4 user interface conventions and APIs.Part Four delivers practical coverage of Android’s multimedia, search, location, sensor, and account APIs, plus the Native Development Kit, enabling developers to add advanced capabilities.This updated edition of Programming Android focuses on the knowledge and developer priorities that are essential for successful Android development projects.