Book picks similar to
Gigabit Ethernet: Migrating to High-Bandwidth LANs by Jayant Kadambi
amazon-purchase
and
computers
science
Loving a Forbidden Bride
Cassidy Hanton - 2019
As the vendetta between the Wagners and the Paytons is reignited, the town prepares for yet another war. With his parents’ death still heavy on his shoulders, Marc Payton must take care of his sister and family ranch. Danger lurks around every corner, but things change the minute he lays his eyes on the beautiful Olivia Wagner. Their love is forbidden, transcending the decades-old feud... When a terrible “accident” occurs, Olivia and Marc must set their differences aside and unite forces. Racing against a ticking clock to rescue a helpless family from certain doom, their love will be tested...twice. A terrible storm is brewing extremely close to them and they don't even know it. *This is Cassidy's 2nd novel, a Western historical romance novel of 80,000 words (around 400 pages). No cheating, no cliffhangers, and a strong happily ever after. Pick up "Loving a Forbidden Bride" today to discover Cassidy's fantastic new story!
The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset
Joy Mundy - 2006
In this new edition, the authors explain how SQL Server 2008 R2 provides a collection of powerful new tools that extend the power of its BI toolset to Excel and SharePoint users and they show how to use SQL Server to build a successful data warehouse that supports the business intelligence requirements that are common to most organizations. Covering the complete suite of data warehousing and BI tools that are part of SQL Server 2008 R2, as well as Microsoft Office, the authors walk you through a full project lifecycle, including design, development, deployment and maintenance.Features more than 50 percent new and revised material that covers the rich new feature set of the SQL Server 2008 R2 release, as well as the Office 2010 release Includes brand new content that focuses on PowerPivot for Excel and SharePoint, Master Data Services, and discusses updated capabilities of SQL Server Analysis, Integration, and Reporting Services Shares detailed case examples that clearly illustrate how to best apply the techniques described in the book The accompanying Web site contains all code samples as well as the sample database used throughout the case studies The Microsoft Data Warehouse Toolkit, Second Edition provides you with the knowledge of how and when to use BI tools such as Analysis Services and Integration Services to accomplish your most essential data warehousing tasks.
MySQL Crash Course
Ben Forta - 2005
And this book will teach you all you need to know to be immediately productive with MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than you'd have thought possible. Learn how to: Retrieve and sort data Filter data using comparisons, regular expressions, full text search, and much more Join relational data Create and alter tables Insert, update, and delete data Leverage the power of stored procedures and triggers Use views and Cursors Manage transactional processing Create user accounts and manage security via access control Ben Forta is Macromedia's Senior Technical Evangelist, and has almost 20 years of experience in the computer industry in product development, support, training, and product marketing. Ben is the author of the best-selling Sams Teach Yourself SQL in 10 Minutes (now in its third edition, and translated into over a dozen languages), ColdFusion Web Application Construction Kit, and Advanced ColdFusion Development (both published by Que Publishing), Sams Teach Yourself Regular Expressions in 10 Minutes, as well as books on SQL, Flash, JSP, HomeSite, WAP, Windows 2000, and other subjects.
The Hunt for MH370
Ean Higgins - 2019
Piece by tantalising piece, Ean Higgins unpuzzles this most baffling of mysteries, asking dangerous questions and revealing shocking truths.' Dick Smith'The disappearance of MH370 remains the greatest and most pressing mystery in aviation history that demands answers for both the families of the stricken passengers and the travelling public. No journalist has been more relentless in the pursuit of the truth of MH370 than Ean Higgins. The Hunt for MH370 is an engrossing book in which Higgins has meticulously pieced together the puzzle of the doomed flight from its vanishing to the flawed investigation and the largest maritime search ever that leads the reader to a chilling conclusion that is almost impossible to comprehend.'Paul Whittaker, Chief Executive Sky News and former editor-in-chief, The Australian
Blockchain Technology Explained: The Ultimate Beginner’s Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero, Ripple, Dash, IOTA and Smart Contracts
Alan T. Norman - 2017
Topics you can expect to see in this book include: ● What problem does blockchain solve? ● How can technology make our institutions faster and less expensive? ● Could technology replace our institutions (like governments, banks, etc) altogether? ● How does blockchain build trust between strangers? ● How does blockchain increase security for transactions and contracts? ● Can blockchain be used outside of finance? ● What is a block? ● What is the chain and why do we need it? ● What’s a technical explanation of what happens in the blockchain? ● What is mining and why do we need it? ● Are there alternatives to mining to create a blockchain? ● What’s the story of Bitcoin? ● Does Bitcoin have any problems? ● What is Ethereum, and what is a smart contract? ● Are there other blockchain technologies I should know about? ● How are companies adopting blockchain? ● What regulatory hurdles might slow blockchain adoption? Whew, that’s a lot of questions. If you’re ready to tackle them, I’m ready
Equations of Life
Simon Morden - 2011
Dick AwardSamuil Petrovitch is a survivor.He survived the nuclear fallout in St. Petersburg and hid in the London Metrozone – the last city in England. He’s lived this long because he’s a man of rules and logic.For example, getting involved = a bad idea.But when he stumbles into a kidnapping in progress, he acts without even thinking. Before he can stop himself, he’s saved the daughter of the most dangerous man in London.And clearly saving the girl = getting involved.Now, the equation of Petrovitch’s life is looking increasingly complex.Russian mobsters + Yakuza + something called the New Machine Jihad = one dead Petrovitch.But Petrovitch has a plan – he always has a plan – he’s just not sure it’s a good one.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Cocoa Programming for Mac OS X
Aaron Hillegass - 2001
Now updated for both current developments in OS 10.4 and 10.5, this comprehensive guide to developing Cocoa guides programmers through the key features of Cocoa, and takes them step by step through the creation of typical applications.
The Dark Net: Inside the Digital Underworld
Jamie Bartlett - 2014
A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.
The Wright Brothers: A History From Beginning to End
Hourly History - 2017
Wilbur and Orville Wright have gone down in history as pioneers of flight and the inventors of the first airplane. This is the story of how their mechanical interest in printing presses and bicycles led them towards finding solutions to the conundrum of flight. Find out how their methodological research and innovative ideas set them apart from other inventors, and learn about the newspaper editors and scientists’ reactions to the Wright brothers’ achievement—the slow transformation of skepticism and disbelief to amazement. Inside you will read about... ✓ The House at 7 Hawthorne Street ✓ Flying on Two Wheels ✓ The Dream of Flight ✓ Three Gliders and a Windy Hill ✓ The First Flight ✓ Convincing the Skeptics ✓ The Dawn of a New Era And much more! This is not only the story of the success of two determined brothers from Dayton, but it is the story of a new chapter of history.
iPad: The Missing Manual
J.D. Biersdorfer - 2010
That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.
Running Linux
Matt Welsh - 1995
This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an enjoyable environment for personal computing, learning system administration and programming skills, and all-around hacking.This book, now in its third edition, has been widely recognized for years in the Linux community as the getting-started book people need. It goes into depth about configuration issues that often trip up users but are glossed over by other books.A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and at a low cost from many vendors. Developed first on the PC, it has been ported to many other architectures and can now support such heavy-duty features as multiprocessing, RAID, and clustering.Software packages on Linux include the Samba file server and Apache Web server; the X Window System (X11R6); TCP/IP networking (including PPP, SSH, and NFS support); popular software tools such as Emacs and TeX; a complete software development environment including C, C++, Java, Perl, Tcl/Tk, and Python; libraries, debuggers, multimedia support, scientific and database applications, and much more. Commercial applications that run on Linux range from end-user tools like word processors and spreadsheets to mission-critical software like the Oracle, Sybase, Informix, and IBM DB/2 database management systems.Running Linux has all the information you need to understand, install, and start using the Linux operating system. This includes a comprehensive installation tutorial, complete information on system maintenance, tools for document development and programming, and guidelines for network, file, printer, and Web site administration.
Digital Computer Electronics
Albert Paul Malvino - 1977
The text relates the fundamentals to three real-world examples: Intel's 8085, Motorola's 6800, and the 6502 chip used by Apple Computers. This edition includes a student version of the TASM cross-assembler software program, experiments for Digital Computer Electronics and more.
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
IoT Inc.: How Your Company Can Use the Internet of Things to Win in the Outcome Economy
Bruce Sinclair - 2017
They’re in our companies, in our homes, in our pockets. People love these products. But what they love more is what these products do—and for anyone running a business today, outcomes are the key. The Internet of Things (IoT) is the point of connection between products and the results they deliver—it’s where products become software. IoT Inc. explains everything you need to know to position your company within this powerful new network. And once you do, you’ll leave the competition in the dust. Founder and president of today’s leading IoT business consulting firm, Bruce Sinclair has been helping companies develop IoT strategies for a decade—far longer than the term has even existed. This essential guide provides an in-depth look into IoT—how it works and how it is transforming business; methods for seeing your own business, customers, and competitors through the lens of IoT, and a deep dive into how to develop and implement a powerful IoT strategy. IoT isn’t a new business trend. It’s the new way of business. Period. The IoT wave is heading for your industry. You can either meet it head-on, and ride it to success, or you can turn your back and let it swamp you. This is your playbook for transforming your company into a major player in the IoT Outcome economy.