Book picks similar to
Mastering Excel Macros: Introduction (Book 1) by Mark Moore
reference
computers
excel
computer
The Non-Designer's Design Book
Robin P. Williams - 2003
Not to worry: This book is the one place you can turn to find quick, non-intimidating, excellent design help. In The Non-Designer's Design Book, 2nd Edition, best-selling author Robin Williams turns her attention to the basic principles of good design and typography. All you have to do is follow her clearly explained concepts, and you'll begin producing more sophisticated, professional, and interesting pages immediately. Humor-infused, jargon-free prose interspersed with design exercises, quizzes, illustrations, and dozens of examples make learning a snap—which is just what audiences have come to expect from this best-selling author.
Agile Project Management with Scrum
Ken Schwaber - 2001
But Scrum’s simplicity itself—its lack of prescription—can be disarming, and new practitioners often find themselves reverting to old project management habits and tools and yielding lesser results. In this illuminating series of case studies, Scrum co-creator and evangelist Ken Schwaber identifies the real-world lessons—the successes and failures—culled from his years of experience coaching companies in agile project management. Through them, you’ll understand how to use Scrum to solve complex problems and drive better results—delivering more valuable software faster.Gain the foundation in Scrum theory—and practice—you need to:Rein in even the most complex, unwieldy projectsEffectively manage unknown or changing product requirementsSimplify the chain of command with self-managing development teamsReceive clearer specifications—and feedback—from customersGreatly reduce project planning time and required toolsBuild—and release—products in 30-day cycles so clients get deliverables earlierAvoid missteps by regularly inspecting, reporting on, and fine-tuning projectsSupport multiple teams working on a large-scale project from many geographic locationsMaximize return on investment!
Natural Language Processing with Python
Steven Bird - 2009
With it, you'll learn how to write Python programs that work with large collections of unstructured text. You'll access richly annotated datasets using a comprehensive range of linguistic data structures, and you'll understand the main algorithms for analyzing the content and structure of written communication.Packed with examples and exercises, Natural Language Processing with Python will help you: Extract information from unstructured text, either to guess the topic or identify "named entities" Analyze linguistic structure in text, including parsing and semantic analysis Access popular linguistic databases, including WordNet and treebanks Integrate techniques drawn from fields as diverse as linguistics and artificial intelligenceThis book will help you gain practical skills in natural language processing using the Python programming language and the Natural Language Toolkit (NLTK) open source library. If you're interested in developing web applications, analyzing multilingual news sources, or documenting endangered languages -- or if you're simply curious to have a programmer's perspective on how human language works -- you'll find Natural Language Processing with Python both fascinating and immensely useful.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
GMAT Critical Reasoning, Guide 6
Manhattan GMAT - 2007
Fully updated and revised to deal with recent changes to the GMAT, they were designed with a content-based approach.The Critical Reasoning Guide demystifies critical reasoning by teaching a clear, consistent, and effective approach to understanding an argument’s logic and choosing the best answer to the given question. Unlike other guides that attempt to convey everything in a single tome, the Critical Reasoning Strategy Guide is designed to provide deep, focused coverage of one specialized area tested on the GMAT. As a result, students benefit from thorough and comprehensive subject material, clear explanations of fundamental principles, and step-by-step instructions of important techniques. In-action practice problems and detailed answer explanations challenge the student, while topical sets of Official Guide problems provide the opportunity for further growth. Used by itself or with other Manhattan GMAT Strategy Guides, the Critical Reasoning Guide will help students develop all the knowledge, skills, and strategic thinking necessary for success on the GMAT. Purchase of this book includes one year of access to Manhattan GMAT’s online computer-adaptive practice exams and Critical Reasoning Question Bank. All of Manhattan Prep’s GMAT Strategy Guides are aligned with both the 2015 Edition and 13th Edition GMAC Official Guide.
Master Todoist: How to Use a Simple App to Create Actionable To-Do Lists and Organize Your Life
S.J. Scott - 2017
The truth is: Most to-do lists are a distraction that often cause you to procrastinate on important tasks. Fortunately, the TODOIST app is specifically designed help you manage all your day-to-day tasks -- even when juggling dozens of projects. Todoist is widely considered to be the #1 to-do list app because of its simple functionality. It's elegantly designed so you can download it right now and create your first task list within five minutes. On the other hand, it has many advanced features that allow you to manage hundreds of tasks and projects, without making you feel overwhelmed. All of this and more is covered in the book, "
Master Todoist
." DOWNLOAD: Master Todoist: How to Use a Simple App to Create Actionable To-Do Lists The goal of Master Todoist is to help you rethink your to-do lists. On the surface, you’ll find a walkthrough of all the app's features, but you’ll also discover many advanced strategies for focusing on the tasks that truly matter. Specifically, you will learn how to: Identify the activities that are most important for your personal and professional life Remember every single date-specific appointment, meeting, and personal obligation Create projects with clearly identifiable next steps Use Todoist to remove the distractions and "noise" that prevent you from focusing on your big-picture activities Implement the advanced features to streamline the most precious asset that you possess -- your time You can eliminate that feeling of overwhelm by redesigning the way you manage tasks. And in Master Todoist, you'll discover how you can take massive action in your life by relying on a simple app that's trusted by over 5 million users. Learn How to Get the Important Things Done by Clicking the "Buy Now" Button at the Top of the Page.
Jumpstart Your Creativity: 10 Jolts to Get Creative and Stay Creative (Jumpstart Series)
Steven Rowell - 2013
This fun lighthearted and easy to read book will give you 10 Jolts to reawaken and tap into your innate creativity in order to be more successful at work and in your personal life. In this book, you will learn the tools techniques and methods for getting and staying creative in a competitive world. "Jumpstart Your Creativity gives you proven specific effective tools and great tips to use, to both generate ideas and evaluate them effectively. Are you ready to tap into your creativity? This book will show you how, and you will be amazed at the results! "Are you creative? Do you want to be more creative in your business and personal life? Everyone has the ability to be creative. This fun lighthearted and easy to read book will give you 10 Jolts to reawaken and tap into your innate creativity in order to be more successful at work and in your personal life.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications
Juan Diego Gauchat
How to Speed Read: A Very Easy Guide
John Connelly - 2012
To make sure you get the most value for money possible I've also included the FREE eBook: "How to Study: 20 Tips to Get the Best Grades". It contains my best best advice on time management, goal setting and how to get the best grades with the least effort. It's advice that also transfers brilliantly well to professionals and the self employed who want to get ahead of the competition.----------HOW TO SPEED READ: FREE EXCERPT BELOW----------TECHNIQUE TWO- SEE MORE, MOVE YOUR EYES LESSAnother barrier to higher reading speeds is, again, learnt as a child. We learn to read by looking at one word at a time. It is perhaps the only way we can learn to read, but it offers a second obstacle by asking our eyes to move their fixation again, and again: which is time consuming.The human vision is much more capable than being asked to merely look at specifically one word at a time. You don’t have to move your eyes onto every word to be able to read a sentence.A quick step to become aware of this is to focus your sight in the middle of a sentence and notice that as you do so, you can in fact read the words around the central word, indeed without moving your sight from the center you may be able to read the whole sentence with your eyes resting at just this one space. If this is difficult, or the sentence is simply too long, mark two points in the sentence, one a third of the way in, and one two thirds of the way in, and use those as points to rest your eyes on while you read each word of the line of text. Using your wider vision, and attempting to see more will further help you to improve the speed at which you read as you minimize time spent moving your eyes.A useful technique is to use the above method and draw two lines down the page you are reading, dissecting it into thirds. Now practice moving your eyes only between these two points and reading all the words without any further eye movement. If you are struggling to take in the all the words in the line, try and relax your eyes, make them feel slightly lazy so that they aren’t focused so narrowly. Let your gaze be weaker, and soon you will be able to see more than you had before.
Introduction to the Theory of Computation
Michael Sipser - 1996
Sipser's candid, crystal-clear style allows students at every level to understand and enjoy this field. His innovative "proof idea" sections explain profound concepts in plain English. The new edition incorporates many improvements students and professors have suggested over the years, and offers updated, classroom-tested problem sets at the end of each chapter.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
Getting Started with Processing
Casey Reas - 2010
Programming courses usually start with theory, but this book lets you jump right into creative and fun projects. It's ideal for anyone who wants to learn basic programming, and serves as a simple introduction to graphics for people with some programming skills.Written by the founders of Processing, this book takes you through the learning process one step at a time to help you grasp core programming concepts. You'll learn how to sketch with code -- creating a program with one a line of code, observing the result, and then adding to it. Join the thousands of hobbyists, students, and professionals who have discovered this free and educational community platform.Quickly learn programming basics, from variables to objectsUnderstand the fundamentals of computer graphicsGet acquainted with the Processing software development environmentCreate interactive graphics with easy-to-follow projectsUse the Arduino open source prototyping platform to control your Processing graphics
Building Cloud Apps with Microsoft Azure: Best Practices for DevOps, Data Storage, High Availability, and More (Developer Reference)
Scott Guthrie - 2014
The patterns apply to the development process as well as to architecture and coding practices. The content is based on a presentation developed by Scott Guthrie and delivered by him at the Norwegian Developers Conference (NDC) in June of 2013 (part 1, part 2), and at Microsoft Tech Ed Australia in September 2013 (part 1, part 2). Many others updated and augmented the content while transitioning it from video to written form. Who should read this book Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overview of the most important concepts and practices they need to know. The concepts are illustrated with concrete examples, and each chapter includes links to other resources that provide more in-depth information. The examples and the links to additional resources are for Microsoft frameworks and services, but the principles illustrated apply to other web development frameworks and cloud environments as well. Developers who are already developing for the cloud may find ideas here that will help make them more successful. Each chapter in the series can be read independently, so you can pick and choose topics that you're interested in. Anyone who watched Scott Guthrie's "Building Real World Cloud Apps with Windows Azure" presentation and wants more details and updated information will find that here. Assumptions This ebook expects that you have experience developing web applications by using Visual Studio and ASP.NET. Familiarity with C# would be helpful in places.
Java for Dummies [With CDROM]
Barry Burd - 2006
This book makes it easy From how to install and run Java to understanding classes and objects and juggling values with arrays and collections, you will get up to speed on the new features of Java 6 in no time.Discover how toUse object-oriented programmingWork with the changes in Java 6 and JDK 6Save time by reusing codeMix Java and Javascript with the new scripting toolsTroubleshoot code problems and fix bugsAll on the bonus CD-ROMCustom build of JCreator and all the code files used in the bookBonus chapters not included in the bookTrial version of Jindent, WinOne, and NetCaptor freewareSystem Requirements: For details and complete system requirements, see the CD-ROM appendix.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.