PHP Pocket Reference


Rasmus Lerdorf - 2000
    The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.

The Java Programming Language


Ken Arnold - 1996
    As the creators of the Java programming language, the authors help programmers understand why Java is such a powerful language. As a result, the programmers learn how Java is suitable for building a variety of applications. The authors also provide unique "behind-the-scenes" insights into how the language was designed and intended to be used. Thoroughly revised from start to finish, this fourth edition covers all of the features of J2SE 5.0 release. Updates to the fourth edition of this best-seller include concise coverage on generics, metadata, autoboxing, enumerations, enhanced loops, and more.

Software Engineering: A Practitioner's Approach


Roger S. Pressman - 1982
    This book provides information on software tools, specific work flow for specific kinds of projects, and information on various topics. It includes resources for both instructors and students such as checklists, 700 categorized web references, and more.

Computer Networks and Internets [With CDROM and Companion Website Access Code Card]


Douglas E. Comer - 1996
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Python: 3 Manuscripts in 1 book: - Python Programming For Beginners - Python Programming For Intermediates - Python Programming for Advanced


Maurice J. Thompson - 2018
    This Box Set Includes 3 Books: Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓Introduction ✓Understanding Python: A Detailed Background ✓How Python Works ✓Python Glossary ✓How to Download and Install Python ✓Python Programming 101: Interacting With Python in Different Ways ✓How to Write Your First Python Program ✓Variables, Strings, Lists, Tuples, Dictionaries ✓About User-Defined Functions ✓How to Write User-Defined Functions in Python ✓About Coding Style ✓Practice Projects: The Python Projects for Your Practice Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓ Shallow copy and deep copy ✓ Objects and classes in Python–including python inheritance, multiple inheritances, and so on ✓ Recursion in Python ✓ Debugging and testing ✓ Fibonacci sequence (definition) and Memoization in Python in Python ✓ Arguments in Python ✓ Namespaces in Python and Python Modules ✓ Simple Python projects for Intermediates Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓File management ✓Python Iterator ✓Python Generator ✓Regular Expressions ✓Python Closure ✓Python Property ✓Python Assert, and ✓Simple recap projects Start Coding Now!

Ready to Wed: 12 Ways to Start a Marriage You'll Love


Greg Smalley - 2015
    Dress. Cake.You’re engaged, and the checklist for the day of your dreams is a mile long. In the who, what, where, and how of planning, the why can be forgotten.Ready to Wed discusses 12 Traits of a thriving marriage and offers a variety of topics to guide and advise those preparing to say, “I do!”Learn to: Define a vision statement unique to your marriage. Positively engage conflict to build a foundation of trust and forgiveness. “Leave and cleave,” even if you are a child of divorce. Manage expectations—and your in-laws! Navigate hot-button issues including, sex and the chore wars. Cope with change, stress, and crisis—especially in your first year. Build a community of support and find mentors. Assess your progress using the Couple Checkup. Loaded with advice, tips, and instructions, this valuable resource is ideal for soon-to-be-newlyweds and those who support them!

The Charlie Parker Mystery Series: Books 1-4


Connie Shelton - 2012
    She’s an accountant and a partner with her brother in a private investigation business. But when her old friend Stacy North comes looking for help, Charlie gives in and agrees to help.Stacy’s Rolex watch is missing and she’s afraid her husband Brad will find out. The truth is that she was seeing another man, and she’s terrified of Brad’s legendary temper. Charlie finds the missing watch--no problem--but when the “other man” suddenly turns up dead, Stacy is desperate. Can Charlie find out who the real killer is before the police connect Stacy to the victim? It turns out to be the challenge of Charlie’s life.BOOK 2 - Vacations Can Be MurderCharlie is riding front seat on a Hawaiian helicopter tour when she and the pilot spot a lifeless body lying on the rugged rocks of Kauai’s NaPali coast. Drake Langston is the pilot flying the tour. When the flight is over, Charlie assumes her acquaintance with Drake is, too. Within twenty-four hours, though, Drake’s friend and employer, Mack Garvey, is arrested for murdering Gilbert Page. Drake persuades Charlie to help clear Mack.It isn’t easy. The investigating officer has an old grudge against Mack, and it doesn’t help that Mack knew the victim and owed him a half million dollars. Charlie roots out the suspects one by one, never guessing that her own life will be in danger before her vacation is over.BOOK 3 - Partnerships Can Be MurderCharlie returns from her Hawaiian vacation to find her older brother Ron involved with a much younger woman. The more Charlie sees of cute Vicky, the more she realizes how deceitful Ron’s new love is. Is it simply a case of male mid-life crisis, or is there something more devious going on?Meanwhile, Charlie doesn’t have much time to ponder Ron’s problems. Her friend Sharon Ortega is a partner in a restaurant business with David Ruiz. When David turns up dead, an apparent suicide, Sharon comes to Charlie for help. Sharon’s problem is a double-edged sword. If he did kill himself, David’s life insurance won’t pay and Sharon will probably lose the restaurant because she can’t afford to hire a replacement. But if he didn’t kill himself, then it was murder, and Sharon could very well find herself a suspect.BOOK 4 - Small Towns Can Be MurderTucked into the mountains and valleys of northern New Mexico are the hidden towns, little enclaves of history and tradition–and secrets. Charlie and her office assistant Sally Bertrand visit one such place over the July 4th weekend, and when they drop in on a friend they learn that Cynthia Martinez suddenly suffered a miscarriage and died. Privately, friends wonder if spousal abuse caused her death. Charlie agrees to ask a few questions and see what she can find out. Meanwhile, Charlie and her brother Ron have an ongoing dispute over gun control. And Drake Langston, the helicopter pilot she met in Hawaii, is visiting and the romance is heating up.

Fortress Introduction to the Gospels


Mark Allan Powell - 1997
    An introductory chapter surveys the political, religious, and social world of the Gospels, methods of approaching early Christian texts, the genre of the Gospels, and the religious character of these writing. Included also are comments on the Gospels that are not found in the New Testament. Special features, including illustrations and more than two dozen special topics, enhance this convenient volume.

Physics for Scientists and Engineers


Paul Allen Tipler - 1981
    Now in its fourth edition, the work has been extensively revised, with entirely new artwork, updated examples and new pedagogical features. An interactive CD-ROM with worked examples is included. Alternatively, the material on from the CD-ROM can be down-loaded from a website (see supplements section). Twentieth-century developments such as quantum mechanics are introduced early on, so that students can appreciate their importance and see how they fit into the bigger picture.

Professional ASP.NET Design Patterns


Scott Millett - 2008
    Design patterns are time-tested solutions to recurring problems, letting the designer build programs on solutions that have already proved effective Provides developers with more than a dozen ASP.NET examples showing standard design patterns and how using them helpsbuild a richer understanding of ASP.NET architecture, as well as better ASP.NET applications Builds a solid understanding of ASP.NET architecture that can be used over and over again in many projects Covers ASP.NET code to implement many standard patterns including Model-View-Controller (MVC), ETL, Master-Master Snapshot, Master-Slave-Snapshot, Facade, Singleton, Factory, Single Access Point, Roles, Limited View, observer, page controller, common communication patterns, and more

Business Law: The Ethical, Global, and E-Commerce Environment


Jane P. Mallor - 1997
    The cases in the 15th edition are excerpted and edited by the authors. The syntax is not altered, therefore retains the language of the courts. As in recent previous editions, the 15th edition includes a mix of actual AND hypothetical cases. This text is our most research-based Business Law text.

Gödel, Escher, Bach: An Eternal Golden Braid


Douglas R. Hofstadter - 1979
    However, according to Hofstadter, the formal system that underlies all mental activity transcends the system that supports it. If life can grow out of the formal chemical substrate of the cell, if consciousness can emerge out of a formal system of firing neurons, then so too will computers attain human intelligence. Gödel, Escher, Bach is a wonderful exploration of fascinating ideas at the heart of cognitive science: meaning, reduction, recursion, and much more.

Haskell: The Craft of Functional Programming


Simon Thompson - 1996
    Running examples and case studies highlight new concepts and alternative approaches to program design.

Artificial Intelligence for Games (The Morgan Kaufmann Series in Interactive 3D Technology)


Ian Millington - 2006
    The commercial success of a game is often dependent upon the quality of the AI, yet the engineering of AI is often begun late in the development process and is frequently misunderstood. In this book, Ian Millington brings extensive professional experience to the problem of improving the quality of AI in games. A game developer since 1987, he was founder of Mindlathe Ltd., at the time the largest specialist AI company in gaming. Ian shows how to think about AI as an integral part of game play. He describes numerous examples from real games and explores the underlying ideas through detailed case studies. He goes further to introduce many techniques little used by developers today. The book's CD-ROM contains a library of C++ source code and demonstration programs, and provides access to a website with a complete commercial source code library of AI algorithms and techniques. * A comprehensive, professional tutorial and reference to implement true AI in games.* Walks through the entire development process from beginning to end.* Includes over 100 pseudo code examples of techniques used in commercial games, case studies for all major genres, a CD-ROM and companion website with extensive C++ source code implementations for Windows, and source code libraries for Linux and OS X available through the website.