The Wishing Chalice


Sandra Landry - 2004
    But what she found instead was a portal to the past--and possibly the key to her future. Transported back in time, and into the body of a beautiful woman, she cannot deny her growing attraction to her 'husband' Hunter. Nor can they ignore the danger surrounding them, which they must confront--before tragedy strikes.

Sixpence Bride


Virginia Farmer - 2000
    Still, she knew better than to let that fear ruin her tour of England. But no one explained to her that there would be a mock bride auction—or that she would be sucked back in time to the close of the eighteenth century.PricelessSuddenly Jocelyn found herself in another time another body, and in a real auction—being claimed by a real hunk of a man. Still, her bride price hardly seemed flattering. And the handsome Garren had not yet shown her the attention for which she yearned. But as she began to make this new body her own, she saw interest flare behind the lord’s reserved facade. She’d soon show him—and herself—in pounds or pennies, no one was worth more than his…Sixpence Bride

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Doorway To His Heart


Jo Barrett - 2010
    Only problem is, the woman staring back at her from the mirror is not Emily Mayfield. Viscount Westmore knows his wife to be a conniving witch who lives to humiliate him, but from the moment she awakes from her illness, her actions has him doubting everything, even his own heart.

Physics of the Soul: The Quantum Book of Living, Dying, Reincarnation, and Immortality


Amit Goswami - 2001
    The author describes consciousness as more than an abstract concept - it is a reality that is primary and fundamental to science, and is his starting point for all scientific conduct. In this book, he integrates descriptions from the Tibetan Book of the Dead with his knowledge of quantum physics and concludes that reincarnational memory - past lives and our access to them - is an absolute, scientifically provable truth.

The Ruby Programming Language


David Flanagan - 2008
    It was written (and illustrated!) by an all-star team:David Flanagan, bestselling author of programming language "bibles" (including JavaScript: The Definitive Guide and Java in a Nutshell) and committer to the Ruby Subversion repository.Yukihiro "Matz" Matsumoto, creator, designer and lead developer of Ruby and author of Ruby in a Nutshell, which has been expanded and revised to become this book.why the lucky stiff, artist and Ruby programmer extraordinaire. This book begins with a quick-start tutorial to the language, and then explains the language in detail from the bottom up: from lexical and syntactic structure to datatypes to expressions and statements and on through methods, blocks, lambdas, closures, classes and modules. The book also includes a long and thorough introduction to the rich API of the Ruby platform, demonstrating -- with heavily-commented example code -- Ruby's facilities for text processing, numeric manipulation, collections, input/output, networking, and concurrency. An entire chapter is devoted to Ruby's metaprogramming capabilities.The Ruby Programming Language documents the Ruby language definitively but without the formality of a language specification. It is written for experienced programmers who are new to Ruby, and for current Ruby programmers who want to challenge their understanding and increase their mastery of the language.

Billionaire, M.D.


Olivia Gates - 2010
    April: Rodrigo Valderrama, billionaire Spanish surgeon.His Patient: The woman he's always wanted.His Problem: An explosive pregnancy secret.He'd rushed to her side the moment he'd learned of her accident. Whisking the recovering Cybele away to his palatial seafront estate, the wealthy doctor vowed to care for and protect the pregnant young widow...and never let her know his true feelings. But he feared that even with all his brilliant skills, he might not be able to keep Cybele if she learned the truth about his role in her pregnancy.

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information


Michael Bazzell - 2012
    In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details

Savage Courtship


Susan Napier - 1994
    But Vanessa had no intention of falling prey to his dark charm - had Benedict met his match at last...?

Sufism: An Introduction To The Mystical Tradition Of Islam


Carl W. Ernst - 1997
    They are said to represent the mystical heart of Islam, yet the term Sufism is notoriously difficult to define, as it means different things to different people both within and outside the tradition. With that fact in mind, Carl Ernst explores the broadest range of Sufi philosophies and practices to provide one of the most complete and comprehensive introductions to Sufism available in English. He traces the history of the movement from the earliest days of Islam to the present day, along the way examining its relationship to the larger world of Islam and its encounters with both fundamentalism and secularism in the modern world.

Prince's Passion


Carole Mortimer - 2005
    He's bent on transforming a worldwide bestseller into a blockbuster movie, and he must track down the reclusive author of the book. But stubborn Jinx Nixon is in his way... Jinx knows the identity of the writer though she's not about to reveal it! But Nik is as strong-willed as she is and that, combined with his good looks, arrogance and ruthlessness means she will have to fight very hard to control the attraction she feels towards him - and to keep her secret!

Highland Magic: The Complete Highland Historical Series


Kerrigan Byrne - 2017
    and that's a Berserker who's found one. The MacLachlan clan is cursed with an ancient bloodline, strong as ten men and violent as a leigon. Here are 9 stories of men who battle the beast within, and the woman who are strong enough to tame them.

The Secretary's Seduction


Jane Porter - 2002
    The Secretary's Seduction by Jane Porter released on Aug 09, 2005 is available now for purchase.

Dangerous Obsession


Patricia Wilson - 1990
    Only now Dan was back and showed no inclination to keep out of Anna's way. Worse, he made no secret of his attraction to the grown-up Anna.And he had no right to be so jealous of her friend Bryan when his own long-term loyalty lay elsewhere!

The Desert Smells Like Rain: A Naturalist in Papago Indian Country


Gary Paul Nabhan - 1982
    The Desert Smells Like Rain offers insights into the natural history of desert plants and animals as it documents a dying agricultural tradition that has enriched the biological diversity of the Papago's seemingly harsh environment. Drawing on his extensive scientific research and study of Papago folklore, as well as his years of work among the Desert People in village gardening and nutrition programs, Nabhan portrays a desert-adapted way of life that has persisted despite the pressures of modern civilization.