Book picks similar to
Invitation to FORTH by Harry Katzan Jr.


classic-computing
forth
inventory
programming

Brotherhood in Death: In Death by J.D. Robb


Leopard Books - 2016
    Robb A 15-Minute Summary & Analysis Preview: Brotherhood in Death is the latest installment in the In Death series which is about Detective Eve Dallas. She is investigated the disappearance of Edward Mira, the cousin in law of her colleague and friend, Charlotte Mira, a profiler for the police department. What starts a disappearance case quickly turns into a murder case with decades old roots. The case is much more than Eve bargained for. PLEASE NOTE: This is a Summary and Analysis of the book and NOT the original book. This companion includes the following: - Book Review - Character List - Summary of the Chapters - Discussion Questions - Analysis of Themes & Symbols This Analysis fills the gap, making you understand more while enhancing your reading experience.

Manly Crafts


Instructables.com - 2011
    Learn how to make a 5-cent wedding band, leather iPod case, and paracord bullwhip!

Visual C++ Programming


Yashavant P. Kanetkar - 2004
    

Double Eagles


Bill Getz - 2011
    A German pilot is shot down over the English Channel and rescued by the British. It is discovered that he is a high ranking ace, and one of several royal princes flying for the Luftwaffe. His capture also opens a whole new avenue for British and American intelligence to determine the effectiveness of their counterintelligence activities to deceive Adolf Hitler as to Allied intentions for an invasion of Europe. Operation Gemini is launched and is one of the most successful spy operations of the war. Although this is a work of fiction, many of the characters were real and worked in the positions portrayed in the story. The main characters are fictitious. Wars are replete with secrets, deceptions and lies, prompting Winston Churchill to have famously said, and oft-quoted, “In wartime, truth is so precious that she should always be attended by a bodyguard of lies.” This tale could be one such lie. Chinese philosopher Sun Tzu said, All warfare is based upon deception. So are novels. 575 Pages.

Core Java: An Integrated Approach


R. Nageswara Rao - 2008
    Considering just how java is dominating the software industry these days, it is vital for all software and it professionals to be knowledgeable in it. This book is ideal even for new learners as it provides detailed descriptions even of the basic concepts of java, in a very simple and easily understandable way. The best part about using this book is that once you have gone through it, you are sure to be able to write basic java programs on your own. Another highlight of this book is that instead of being vague, it provides you with a detailed explanation of all the concepts that concern this topic. Core java: an integrated approach includes many examples that are helpful as they help students get rid of the fears that they have, concerning programming. Students are also provided with an exhaustive list of questions concerning the topic, which are frequently asked in interviews. This is beneficial for students as they appear for interviews in the future. The first edition of the core java: an integrated approach has been published by dreamtech press in the year 2008 and is available in paperback.key features: this book includes 32 chapters that focus on various java-related topics. Students are provided with an exhaustive list of questions that often feature in interviews for programming jobs.

Ever After High: Royals and Rebels


Parragon Books - 2014
    This book features activites, quizzes, stories, crafts and key informations about the characters and world of Ever After High.

McGraw-Hill's GED: The Most Complete and Reliable Study Program for the GED Tests


Patricia Mulcrone - 2001
    It offers targeted assessment, easy-to-follow instruction, hundreds of reinforcement activities, and simulated GED tests for all five GED subject areas: Test 1 Language Arts, Writing; Test 2 Social Studies; Test 3 Science; Test 4 Language Arts, Reading; Test 5 Mathematics. A half-length Pretest for each subject helps pinpoint strengths and weaknesses for targeting study. Clear instruction, followed by hundred of practice questions in official GED format help to build confidence. A Posttest for each subject is followed by a second Practice Test in official GED format to determine readiness for the actual test.

Introducing Windows 8.1 for It Professionals


Ed Bott - 2013
    It is offered for sale in print format as a convenience.Get a head start evaluating Windows 8.1 - with early technical insights from award-winning journalist and Windows expert Ed Bott. Based on the Windows 8.1 Preview release, this guide introduces new features and capabilities, with scenario-based advice on how Windows 8.1 can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Preview new features and enhancements, including:How features compare to Windows 7 and Windows XP The Windows 8.1 user experience Deployment Security features Internet Explorer 11 Delivering Windows apps Recovery options Networking and remote access Managing mobile devices Virtualization Windows RT 8.1

Programming Windows 8 Apps with HTML, CSS, and JavaScript


Kraig Brockschmidt - 2012
    

Sun Certified Programmer & Developer for Java 2 Study Guide (Exam 310-035 & 310-027)


Kathy Sierra - 2002
    More than 250 challenging practice questions have been completely revised to closely model the format, tone, topics, and difficulty of the real exam. An integrated study system based on proven pedagogy, exam coverage includes step-by-step exercises, special Exam Watch notes, On-the-Job elements, and Self Tests with in-depth answer explanations to help reinforce and teach practical skills.Praise for the author:"Finally A Java certification book that explains everything clearly. All you need to pass the exam is in this book."--Solveig Haugland, Technical Trainer and Former Sun Course Developer"Who better to write a Java study guide than Kathy Sierra, the reigning queen of Java instruction? Kathy Sierra has done it again--here is a study guide that almost guarantees you a certification "--James Cubeta, Systems Engineer, SGI"The thing I appreciate most about Kathy is her quest to make us all remember that we are teaching people and not just lecturing about Java. Her passion and desire for the highest quality education that meets the needs of the individual student is positively unparalleled at SunEd. Undoubtedly there are hundreds of students who have benefited from taking Kathy's classes."--Victor Peters, founder Next Step Education & Software Sun Certified Java Instructor"I want to thank Kathy for the EXCELLENT Study Guide. The book is well written, every concept is clearly explained using a real life example, and the book states what you specifically need to know for the exam. The way it's written, you feel that you're in a classroom and someone is actually teaching you the difficult concepts, but not in a dry, formal manner. The questions at the end of the chapters are also REALLY good, and I am sure they will help candidates pass the test. Watch out for this Wickedly Smart book."-Alfred Raouf, Web Solution Developer, Kemety.Net"The Sun Certification exam was certainly no walk in the park but Kathy's material allowed me to not only pass the exam, but Ace it "--Mary Whetsel, Sr. Technology Specialist, Application Strategy and Integration, The St. Paul Companies

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

Freddie Me: Life Lessons from Freddie Bennett, Augusta National's Legendary Caddy Master


Tripp Bowden - 2009
    All the ten year old Bowden knew about golf was that it was a stupid game that took up too much of his father’s time, and that he’d much rather kick around a soccer ball or stay home and read a book. But all that changed once Bowden’s father, a renowned local doctor, introduced him to one of his patients, Freddie Bennett, the legendary Augusta National caddie master. Though Bowden was a white child of considerable privilege and Bennett was an older black gentleman of more modest means, the two formed an unusual bond. It was Bennett who introduced Bowden to the game of golf, a sport that would one day earn him a Division 1 golf scholarship and lead him to the final stage of a British Open qualifier. But it was the lessons Bennett taught the young Bowden off the course that had their profoundest impact on his life. Through Freddie and his particular brand of homespun wisdom, the author learned invaluable lessons about personal responsibility, hard work, and respect for others regardless of age, race or religion. He also learned that there’s much more to life than just playing golf. Like the bestsellers Tuesdays With Morrie and Seasons of Life before it, Freddie & Me is a heartwarming tale of two unlikely friends and their uncommon bond forged through sport.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Starting Out with C++: Early Objects (Formerly Alternate Edition)


Tony Gaddis - 2005
    Objects are introduced early, right after control structures and before arrays and pointers. The STL string class is used throughout. As with all Gaddis books, there is a strong emphasis on problem solving and program design, a careful step-by-step introduction of each new topic, clear and easy to read code listings, concise and practical real world examples, and an abundance of exercises in each chapter.

Async in C# 5.0


Alex Davies - 2012
    Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives