Problem Solving with C++: The Object of Programming


Walter J. Savitch - 1995
    It introduces the use of classes; shows how to write ADTs that maximize the perfomance of C++ in creating reusable code; and provides coverage of all important OO functions, including inheritance, polymorphism and encapsulation.

How Google Works


Eric Schmidt - 2014
    As they helped grow Google from a young start-up to a global icon, they relearned everything they knew about management. How Google Works is the sum of those experiences distilled into a fun, easy-to-read primer on corporate culture, strategy, talent, decision-making, communication, innovation, and dealing with disruption.The authors explain how the confluence of three seismic changes - the internet, mobile, and cloud computing - has shifted the balance of power from companies to consumers. The companies that will thrive in this ever-changing landscape will be the ones that create superior products and attract a new breed of multifaceted employees whom the authors dub 'smart creatives'. The management maxims ('Consensus requires dissension', 'Exile knaves but fight for divas', 'Think 10X, not 10%') are illustrated with previously unreported anecdotes from Google's corporate history.'Back in 2010, Eric and I created an internal class for Google managers,' says Rosenberg. 'The class slides all read 'Google confidential' until an employee suggested we uphold the spirit of openness and share them with the world. This book codifies the recipe for our secret sauce: how Google innovates and how it empowers employees to succeed.'

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

Training Guide: Programming in HTML5 with JavaScript and CSS3


Glenn Johnson - 2013
    Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for using HTML5, JavaScript, and CSS3 to begin building modern web and Windows 8 apps Features pragmatic lessons, exercises, and practices Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as 70-480 Coverage includes: creating HTML5 documents; implementing styles with CSS3; JavaScript in depth; using Microsoft developer tools; AJAX; multimedia support; drawing with Canvas and SVG; drag and drop functionality; location-aware apps; web storage; offline apps; writing your first simple Windows 8 apps; and other key topics

The Art of War Plus the Art of Management: Strategy for Leadership


Sun Tzu - 2005
    Volume 1 (this book) is a reprint of the original 1910 edition (published by Luzac & Co., London) of Sun Tzu on the Art of War: The Oldest Military Treatise in the World by Lionel Giles. The Chinese text, Giles' English translation, as well as his extensive notes are all faithfully reproduced. A Wade-Giles to Pinyin conversion table has been added to make the original classic more useful for the modern student. Volume 2, available separately, includes each chapter in Chinese traditional characters, the pinyin transcription, as well as the English translation.

Zero Day


Mark E. Russinovich - 2011
    An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the U.S. computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe.Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today -- it's a cataclysmic disaster just waiting to happen.

Stay Away from my ER and other fun bits of wisdom: Wobbling between humor and heartbreak


Rada Jones - 2020
    You can’t fathom the weirdness– unless you’re one of the ER aliens. If you are, buy a dozen copies to give away: to your family, your neighbors, and the PTA. They’ll learn things you never had the heart to tell them, but they should know, like how it's like to work in the ER, the deviousness of shampoo bottles and the dangers of frying bacon naked.

Affirmations: The Power of Affirmations & The Secret to Their Success - Plus 1,000 Positive Affirmations to Transform Any Area of Your Life (Law of Attraction in Action Book 2)


Louise Stapely - 2014
     The Power of Affirmations reveals exactly why affirmations don’t work well, and how to create ones that DO work. Topics covered in this report: - What is an Affirmation? - Why Don’t Affirmations Work Much of the Time? - The True Purpose of Affirmations - How to Create Effective Affirmations - How to Tell if Your Affirmations Will Work - How Often You Should Recite Affirmations - The Best Way to Recite Affirmations - Other Ways to Use Affirmations - How Fast Do Affirmations Work? - Several Ways to Speed Up the Process - Common Challenges in Using Affirmations The Power of Affirmations clears up a lot of misconceptions about affirmations and provides you with simple, clear steps to create powerful, effective affirmations for any and all areas of your life. Money, career, relationships, health, beauty, love… virtually every part of your life can be improved with the use of affirmations if you know how to use them correctly. A comprehensive list of positive affirmations has been included in this book to help transform almost any area of your life, broken down into the following headings: - Wealth & Success - Physical Body - Love & Relationships - Self Esteem - Peace & Harmony

UNIX Concepts and Applications


Sumitabha Das - 2003
    

Connect: The Secret LinkedIn Playbook To Generate Leads, Build Relationships, And Dramatically Increase Your Sales


Josh Turner - 2015
    We go to networking events, meet associates for coffee, or maybe even email prospective clients, but it’s never quite enough. The challenge that faces us, and the problem with these activities, is that they don’t scale. The number of people you need to need to meet in order to advance your business, build your influence, and fill the top of your sales funnel is simply too many to handle. This book contains the solution. In Connect, Josh Turner lays out a step-by-step process to meet and connect with the people that matter to your business at scale. The techniques contained in these pages will teach you to use new tools and marketing channels to build relationships without being confined by time.

Programming WCF Services


Juval Lowy - 2007
    Relentlessly practical, the book delivers insight, not documentation, to teach developers what they need to know to build the next generation of SOAs.After explaining the advantages of service-orientation for application design and teaching the basics of how to develop SOAs using WCF, the book shows how you can take advantage of built-in features such as service hosting, instance management, asynchronous calls, synchronization, reliability, transaction management, disconnected queued calls and security to build best in class applications. "Programming WCF Services" focuses on the rationale behind particular design decisions, often shedding light on poorly-documented and little-understood aspects of SOA development. Developers and architects will learn not only the "how" of WCF programming, but also relevant design guidelines, best practices, and pitfalls. Original techniques and utilities provided by the author throughout the book go well beyond anything that can be found in conventional sources.Based on experience and insight gained while taking part in the strategic design of WCF and working with the team that implemented it, "Programming WCF Services" provides experienced working professionals with the definitive work on WCF. Not only will this book make you a WCF expert, it will make you a better software engineer. It's the Rosetta Stone of WCF.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

How Linux Works: What Every Superuser Should Know


Brian Ward - 2004
    Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.

Adobe Photoshop CC Classroom in a Book (2014 Release)


Andrew Faulkner - 2014
    Adobe Photoshop CC Classroom in a Book contains 14 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Photoshop interface, this completely revised CC (2014 release) edition covers new features, including Generator, 3D printing, linked Smart Objects, Blur Gallery, smarter Smart Guides, Perspective Warp, and more. Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, goto www.peachpit.com/redeem and redeem the unique code provided inside this book. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training