Surrendered to the Berserkers (Berserker Saga Book 14)


Lee Savino - 2021
    

Second Lives


Anish Sarkar - 2016
    Discovering that Rachel, a sports journalist, had been doing a story on the brutal killing of a foreign tourist, they are puzzled by her interest in such a grisly crime. It emerges that Rachel’s investigation went far beyond a single murder, and their lives are soon under threat too.With a traumatic event from their teenage years coming back to haunt them, the trio realises that the mystery has its roots in their own past. In the midst of battling their personal demons, they make a desperate plan to flush out a sadistic killer in the sylvan setting of their old boarding school in the Himalayan foothills. With the body count rising and long-buried secrets tumbling out, will they succeed?

The Haunting of Rose Mansion


Clarice Black - 2017
    But strange events at the house have her worried for the safety of her charges. Steeped in horrific history Rose Mansion isn't a welcome place. Floorboards creak, doors open and close, and strange sounds resonate at night. Nothing unusual for such an old house. Surely? But Ashley feels there is something else. Something dark. Something sinister. As matters begin to escalate, she begins to doubt her own sanity...

Epic Text Fails! 2: More Funniest Autocorrects, Wrong Numbers, and Smartphone Mishaps


Marcus Rainey - 2014
    Yes, it is really that good." "This is going to be my 'go to book' when I've had a bad day!" Please Note: Some profanity, not for children!

Computer Organization & Design: The Hardware/Software Interface


David A. Patterson - 1993
    More importantly, this book provides a framework for thinking about computer organization and design that will enable the reader to continue the lifetime of learning necessary for staying at the forefront of this competitive discipline. --John Crawford Intel Fellow Director of Microprocessor Architecture, Intel The performance of software systems is dramatically affected by how well software designers understand the basic hardware technologies at work in a system. Similarly, hardware designers must understand the far reaching effects their design decisions have on software applications. For readers in either category, this classic introduction to the field provides a deep look into the computer. It demonstrates the relationship between the software and hardware and focuses on the foundational concepts that are the basis for current computer design. Using a distinctive learning by evolution approach the authors present each idea from its first principles, guiding readers through a series of worked examples that incrementally add more complex instructions until they ha

Neural Networks: A Comprehensive Foundation


Simon Haykin - 1994
    Introducing students to the many facets of neural networks, this text provides many case studies to illustrate their real-life, practical applications.

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Light of the Desert


Lucette Walters - 2007
    Until one night in London. Just two months before graduating from a posh London Ladies college, and while planning her lavish wedding to her childhood sweetheart, Noora is framed by her sister who masterminded a plot to destroy Noora's happiness. Believing she has shamed him and in order to preserve his family name, Noora's father attempts to drown her in an act of "honor killing." Unbeknownst to him, she survives. Barely clinging to life, she flees from her father's mansion and is rescued by a tribe of Bedouins. Still in danger, Noora travels nearly half way around the world in search of sanctuary. All along her path she must hide her true identity, while hoping to return one day and prove her innocence. However, she is relentlessly stalked by her fundamentalist former bodyguard who discovered she is still alive and vows to bring her back to "justice." Follow Noora on this remarkable journey of courage and survival against all obstacles. Light of the Desert shares the moving tale of a Middle Eastern woman's remarkable journey of survival, courage, and the ultimate act of humanity. "... A truly inspiring and engrossing novel..." -Connie Harris, MyShelf.com

Left to Die


Frank Roderus - 2000
    Wes survived and now, he's plotting his revenge. He's gonna have to stay one step ahead of these self-appointed executioners -- because they ain't likely to make the same mistake twice.

Honey Dipp 1


Reds Johnson - 2014
    Encountering one problem after another, she hasn’t been able to catch a break. A ray of light finally breaks through Honey Dipp's gloomy world when she meets super sexy GUY SANTOS. Not only does he give Honey the most breathtaking sex she's ever experienced, but he gives her his heart. Honey is in bliss! But when Honey Dipp's sordid past forges its way into the relationship, will Guy continue to love her or will he leave Honey broken and shattered like so many others have? Exactly how strong is a man's love when it's challenged by a woman's ugly secrets?

Hit You Where You Live (Liars and Vampires Book 7)


Robert J. Crane - 2020
    

The Exceptional S. Beaufont Boxed Set #3: The Complete Political Conspiracy Collection


Sarah Noffke - 2020
    

Carbo and the Thief: And Other Tales of Ancient Rome


Alex Gough - 2014
    On the way he encounters many adventures, strives to solve a mysterious theft, and meets an old friend getting ready for gladiatorial combat. In other stories we visit Elissa, the evil priestess, and Vespillo, the trusty watchman, and discover more about their colourful histories. We see a young boy’s first battle, and travel all the way to the barbaric Hadrian’s Wall. These are vivid tales of ancient Rome, perfect for fans of Wallace Breem, Simon Scarrow and Ben Kane.

Practical C++ Programming


Steve Oualline - 1995
    But this high-level language is relatively difficult to master, even if you already know the C programming language.The 2nd edition of Practical C++ Programming is a complete introduction to the C++ language for programmers who are learning C++. Reflecting the latest changes to the C++ standard, this 2nd edition takes a useful down-to-earth approach, placing a strong emphasis on how to design clean, elegant code.In short, to-the-point chapters, all aspects of programming are covered including style, software engineering, programming design, object-oriented design, and debugging. It also covers common mistakes and how to find (and avoid) them. End of chapter exercises help you ensure you've mastered the material.Practical C++ Programming thoroughly covers: C++ Syntax Coding standards and style Creation and use of object classes Templates Debugging and optimization Use of the C++ preprocessor File input/output Steve Oualline's clear, easy-going writing style and hands-on approach to learning make Practical C++ Programming a nearly painless way to master this complex but powerful programming language.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.