Maniac on the Loose


Steve Hudgins - 2018
    Fearing that he'll lose his job if word gets out, the head of the hospital, Dr. Franklin Grimm desperately attempts to cover up the escape. Meanwhile, there is a Maniac on the Loose.

WIRED: Steve Jobs, Revolutionary


Steven Levy - 2011
    In the wake of his death WIRED presents Steve Jobs: Revolutionary, an eBook featuring our best stories about him. The anthology begins with a remembrance by Wired senior writer Steven Levy, who interviewed Jobs many times over the last two decades. We continue with six other stories that track Jobs on his uncanny rise, his dramatic fall, and his spectacular, unlikely return to Apple.

The Vivaldi Cipher


Gary McAvoy - 2021
    Desperate, the composer hides a message in a special melody, hoping someone, someday, will take down the culprits . . . Nearly three hundred years later, the confession of a dying Mafia Don alerts a Venetian priest to a wealth of forged paintings in the Vatican Museum, and the key to their identities lies hidden in a puzzling piece of music. Father Michael Dominic, prefect of the Secret Archives, investigates, and is mystified when he finds a cipher in an old composition from Vivaldi. Desperate to stop this centuries-long conspiracy, he calls on fellow sleuth Hana Sinclair and Dr. Livia Gallo, a music cryptologist, to help him crack the code and learn the truth. But the Camorra, a centuries-old Italian Mafia clan, won’t stand by while some interfering priest ruins their most lucrative operation. Along with a French commando and two valiant Swiss Guards, Dominic explores the dark canals and grand palazzos of Venice to uncover the evidence he needs to stop the sinister plot. Can he unearth it in time, or will the Church’s most valuable artworks fall prey to this massive conspiracy? If you love James Rollins, Steve Berry, and Lee Child, you may lose sleep over this impossible to put down thriller! Packed with historical events and non-stop action, readers will be burning through pages late into the night. McAvoy’s fans say his “attention to detail makes the story utterly believable, leaving the reader wondering what is real and what is fiction.”

Eye Bleach


Paul E. Creasy - 2018
    Sylvia Marstens, is making a fresh start. The move from NYU to Silicon Valley is just the ticket to break out of her rut. With a huge boost in salary, beautiful California weather, and complete autonomy at work, her new job is a dream come true. The world’s largest online video sharing service, UVid, has a problem. The Content Moderators hired to review questionable materials are quitting en masse. Some videos are just too disturbing and disgusting to forget. Dr. Marstens, with her unorthodox method of isolating and suppressing traumatic memories, has the perfect solution to solve UVid’s expensive turnover troubles. Her controversial technique, long denounced in the halls of academia, is more than welcome in the land of algorithms and code. It is a match made in heaven. She soon discovers some traumas cut too deep. Sometimes the past comes back. Some horrors will not stay buried. In this terrifying thriller, Dr. Marstens finds even she cannot escape her own dark history, because some things seen, can never be unseen.

Matrix Computations


Gene H. Golub - 1983
    It includes rewritten and clarified proofs and derivations, as well as new topics such as Arnoldi iteration, and domain decomposition methods.

Smashing Node.Js: JavaScript Everywhere


Guillermo Rauch - 2012
    With more traditional web servers becoming obsolete, having knowledge on servers that achieve high scalability and optimal resource consumption using Node.js is the key to your app development success. Teaching you the essentials to making event-driven server-side apps, this book demonstrates how you can use less space and take less time for communication between web client and server.Contains numerous hands-on examples Explains implementation of real-time apps including Socket.IO and HTML5, and WebSockets Addresses practical Node.js advantages from specific design choices Demonstrates why knowledge and use of JavaScript is beneficial Includes an interactive online component with sample chapters Explains components of stand out apps including brevity and benchmarks Looking to enhance your abilities even further? Smashing Node.js: JavaScript Everywhere makes developing server-side apps accessible with its focus on JavaScript, open source, and easy-to-use language.

Numerical Analysis


Richard L. Burden - 1978
    Explaining how, why, and when the techniques can be expected to work, the Seventh Edition places an even greater emphasis on building readers' intuition to help them understand why the techniques presented work in general, and why, in some situations, they fail. Applied problems from diverse areas, such as engineering and physical, computer, and biological sciences, are provided so readers can understand how numerical methods are used in real-life situations. The Seventh Edition has been updated and now addresses the evolving use of technology, incorporating it whenever appropriate.

We Use Coupons, You Should Too! How Couponing Saved My Life


Nathan Engels - 2012
    Coupon as he takes you on a journey that can save you thousands annually and set your family on a path to financial freedom. Nathan Engels, Mr. Coupon, is no stranger to debt. The realization that something drastic needed to be done to change the trajectory of his life led to his discovery and passion for couponing.The biggest "A Ha!" moment of your life will be after reading this book. If you are a skeptic, you will learn the true powers of a piece of paper. With basic couponing techniques, a little Grocery Psychology and a sound methodology, you too can confidently go shopping with coupons in hand and the knowledge that you are saving more than ever before.Mr. Coupon started with over $80,000 in debt, not including the mortgage! Even in a struggling economy, coupons helped Nathan to control his grocery bill and start saving. Today, Nathan and his family are nearly debt free.Are you ready to take flight? Then let's begin, it all starts here!

Embedded Android: Porting, Extending, and Customizing


Karim Yaghmour - 2011
    You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management


Michael J.A. Berry - 1997
    Packed with more than forty percent new and updated material, this edition shows business managers, marketing analysts, and data mining specialists how to harness fundamental data mining methods and techniques to solve common types of business problemsEach chapter covers a new data mining technique, and then shows readers how to apply the technique for improved marketing, sales, and customer supportThe authors build on their reputation for concise, clear, and practical explanations of complex concepts, making this book the perfect introduction to data miningMore advanced chapters cover such topics as how to prepare data for analysis and how to create the necessary infrastructure for data miningCovers core data mining techniques, including decision trees, neural networks, collaborative filtering, association rules, link analysis, clustering, and survival analysis

Nightmares


Matt Shaw - 2019
    He travels around the country meeting with criminals to discuss what is on their minds and assess whether they're ready for a possible parole hearing. It was once a job with meaning; to help those whom needed it the most. A belief he held right up until the moment the prisoners' crimes followed him home, stuck in his own mind. The worst of the criminals he'd met was Billy-Ray. He'd plagued his dreams and his waking hours since the moment they'd met. This monster. The one man who'd managed to convince Jamie he had been reformed from his time in prison. The one man whose own murder-spree - done after his early release from his cell - haunted Jamie the most...

The Phish Book


Phish - 1998
    The first and only authorized book about the band, The Phish Book is an extraordinary verbal and visual chronicle of a year in the life of Phish, featuring extensive interviews with the four band members--Trey Anastasio, Jon Fishman, Mike Gordon, and Page McConnell--conducted by writer Richard Gehr, who also serves as guide to the history, mythology, musical context, and unique audience-band relationship in which the Vermont quartet flourishes.        While it contains many of the trappings of other lavish rock monuments--including more than two hundred pieces of previously unpublished art and photography from the band's private archive--The Phish Book elevates the form by means of an innovative roundtable-style discussion format. Richard Gehr and Phish use the events of 1997 as a jumping-off point from which the band members free-associate about themselves, their music, and the dedicated and colorful community that springs up wherever they perform.        Beginning with the backstage scene at Boston's Fleet Center on New Year's Eve, 1996, The Phish Book explores the band's earliest days in Burlington, Vermont; their musical influences, which include James Brown, Frank Zappa, and the Grateful Dead; their legendary Halloween shows; the two European and two American tours the group undertook in 1997; the stories behind their 1996 studio album, Billy Breathes, and the following year's live Slip Stitch and Pass; life onstage and off; the sixty-thousand-fan Maine campout and art project known as the Great Went; and the experimental recording and performing techniques that informed the band's most recent studio album, The Story of the Ghost.        More than a retrospective journal of the group's evolution, The Phish Book is a glorious snapshot of a band much bigger than its parts and at the height of its collective power.

Indian History


Krishna Reddy - 2009
    It is ideal for students preparing to take the state civil service examinations or any other competitive exams where Indian history is a subject of relevance.The first section begins by looking at the pre-historic cultures in India and goes on to discuss the Indus valley civilization and the Mauryan empire. The second section, on medieval India, looks at significant developments post Gupta dynasty and the rise and fall of the Mughal empire. The third section is on modern India, which majorly focuses on the advent of British rule in the country and the Indian struggle for independence.Each section in the book begins with a brief overview of the period represented through a chronological timeline. A separate section on revision is given at the end, followed by a series of model test papers for self-evaluation.About Krishna ReddyKrishna Reddy has also authored Bharat Ka Itihas and General Knowledge Digest 2010.

Data Modeling Essentials


Graeme Simsion - 1992
    In order to enable students to apply the basics of data modeling to real models, the book addresses the realities of developing systems in real-world situations by assessing the merits of a variety of possible solutions as well as using language and diagramming methods that represent industry practice.This revised edition has been given significantly expanded coverage and reorganized for greater reader comprehension even as it retains its distinctive hallmarks of readability and usefulness. Beginning with the basics, the book provides a thorough grounding in theory before guiding the reader through the various stages of applied data modeling and database design. Later chapters address advanced subjects, including business rules, data warehousing, enterprise-wide modeling and data management. It includes an entirely new section discussing the development of logical and physical modeling, along with new material describing a powerful technique for model verification. It also provides an excellent resource for additional lectures and exercises.This text is the ideal reference for data modelers, data architects, database designers, DBAs, and systems analysts, as well as undergraduate and graduate-level students looking for a real-world perspective.