Book picks similar to
Invitation to FORTH by Harry Katzan Jr.


inventory
programming
classic-computing
forth

XML in a Nutshell


Elliotte Rusty Harold - 2001
    But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution


Donald A. Norman - 1998
    Alas, the computer industry thinks it is still in its rebellious teenage years, exulting in technical complexity. Customers want change. They are ready for products that offer convenience, ease of use, and pleasure. The technology should be invisible, hidden from sight.In this book, Norman shows why the computer is so difficult to use and why this complexity is fundamental to its nature. The only answer, says Norman, is to start over again, to develop information appliances that fit people's needs and lives. To do this companies must change the way they develop products. They need to start with an understanding of people: user needs first, technology last--the opposite of how things are done now.

Muse


Michael Cecilione - 1998
    A handsome author strikes up a conversation with an actress in a bookshop in Manhattan, and she knows this is the start of something that will change her life forever.

Forget Me Not


Adrianne Byrd - 2008
    Launching an investigation that plunges her deep into a world of police corruption, she's about to nail a suspect when stolen goods and several kilos of cocaine are discovered in her house. Certain the killer is setting her up to take the fall, Jaclyn turns to her old partner's best friend, FBI special agent Brad Williams—a man who ignites passion beyond her wildest dreams.or desire? Brad Williams has worked for years to infiltrate the group responsible for the death of Jaclyn's partner. Knowing just how ruthless and lethal the organization is, Brad tries to keep Jaclyn out of harm's way. But this headstrong woman isn't about to accept protection from a man—even if he's as sinfully seductive as Brad. So when Jaclyn's fragile trust in him is shattered by a lie, he will have to do everything in his power to convince her that true love is all about forgiving….

Wishmakers


Dorothy Garlock - 2006
    The titles featured are 'Hidden Dreams' and 'She Wanted Red Velvet'.

Managing The Design Factory: A Product Developer's Toolkit


Donald G. Reinertsen - 1997
    In Managing the Design Factory Donald G. Reinertsen presents concepts and practical tools that will be invaluable for anyone trying to get products out of the pipeline and into the market.The first book to put the principles of World Class Manufacturing to work in the development process, Managing the Design Factory combines the powerful analytical tools of queuing, information, and system theories with the proven ideas of organization design and risk management. The result: a methodical approach to consistently hit the "sweet spot" of quality, cost, and time in developing any product. Reinertsen illustrates these concepts with concrete examples drawn from his work with many leading companies across different industries.Fresh and thought-provoking, the book challenges many of the conventional approaches to product development. "There are no best practices," Reinertsen writes, "the idea of best practices is a seductive but dangerous trap." Unlike other books that promote rules and rituals based on benchmarking "best practices," this book focuses on practical tools that account for varied situations. He breaks new ground with a disciplined, quantitative approach for making decisions on critical issues: When should we use a sequential or concurrent process? Centralized or decentralized control? Functional or team organizations?Full of practical techniques, concrete examples, and solid general principles, this is a real toolkit for product developers. Moreover, it is written with the clarity, precision, and humor that are Reinertsen's trademarks. He promises to challenge the thinking of anyone involved in product development.

The Watch, Thoroughly Revised


Gene Stone - 2006
    In the decade since it was published, the international audience of watch lovers and watch collectors has grown exponentially. It’s time for The Watch, Thoroughly Revised. For this new edition, the original author, Gene Stone, is joined by Stephen Pulvirent of Hodinkee.com. Together, they have thoroughly revamped the book to reflect the current state of the watch world, with the addition of new brands, new models, and more focused and nuanced coverage of the traditional brand leaders, including Rolex, Patek Philippe, Omega, and TAG Heuer.

In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters


Merrill R. Chapman - 2003
    It's a funny and well-written business book that takes a look at some of the most influential marketing and business philosophies of the last twenty years. Through the dark glass of hindsight, it provides an educational and entertaining look at why these philosophies didn't work for many of the country's largest and best-known high-tech companies.Marketing wizard Richard Chapman takes you on a hilarious ride in this book, which is richly illustrated with cartoons and reproductions of many of the actual campaigns used at the time. Filled with personal anecdotes spanning Chapman's remarkable career (he was present at many now-famous meetings and events), In Search of Stupidity, Second Edition examines the best of the worst marketing ideas and business decisions in the last 20 years of the technology industry.This second edition includes new chapters on Google and on how to avoid stupidity, plus the extensive analyses of all chapters from the first edition. You'll want to get a copy because it:Features an interesting preface and interview with Joel Spolsky of "Joel on Software" Offers practical advice on avoiding PR disaster Features actual pictures of some of the worst PR and marketing material ever created Is highly readable and funny Includes theme-based cartoons for every chapter

Embedded Android: Porting, Extending, and Customizing


Karim Yaghmour - 2011
    You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.

Oracle PL/SQL Programming


Steven Feuerstein - 1993
    Packed with examples and helpful recommendations, the book has helped everyone--from novices to experienced developers, and from Oracle Forms developers to database administrators--make the most of PL/SQL. The fourth edition is a comprehensive update, adding significant new content and extending coverage to include the very latest Oracle version, Oracle Database 10g Release 2. It describes such new features as the PL/SQL optimizing compiler, conditional compilation, compile-time warnings, regular expressions, set operators for nested tables, nonsequential collections in FORALL, the programmer-defined quoting mechanism, the ability to backtrace an exception to a line number, a variety of new built-in packages, and support for IEEE 754 compliant floating-point numbers. The new edition adds brand-new chapters on security (including encryption, row-level security, fine-grained auditing, and application contexts), file, email, and web I/O (including the built-in packages DBMS_OUTPUT, UTL_FILE, UTL_MAIL, UTL_SMTP, and UTL_HTTP) and globalization and localization. Co-authored by the world's foremost PL/SQL authority, Steven Feuerstein, this classic reference provides language syntax, best practices, and extensive code, ranging from simple examples to complete applications--making it a must-have on your road to PL/SQL mastery. A companion web site contains many more examples and additional technical content for enhanced learning.

Cuba: A History


Sergio Guerra-Vilaboy - 2010
    He is the author of numerous books on Latin American history and is currently the executive secretary of the Association of Latin American and Caribbean Historians.Oscar Loyola-Vega is a professor of history at the University of Havana.

Blood Lyrics: Poems


Katie Ford - 2014
    Blood Lyrics is a mother's song, one seared with the knowledge that her country wages long, aching wars in which not all lives are equal. There is beauty imparted, too, but it arrives at a cost: "Don't say it's the beautiful / I praise," Ford writes. "I praise the human, / gutted and rising."

In the Absence of the Sacred: The Failure of Technology & the Survival of the Indian Nations


Jerry Mander - 1991
    "Will interest all readers concerned about our environment and quality of life."-- Publishers Weekly.

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

The C# Player's Guide


R.B. Whitaker - 2012