Savage North Chronicles: The Complete Series


Lindsey Pogue - 2020
    These are the Savage North Chronicles. Over 2,000 pages of superhuman abilities, harrowing adventures, and heartwarming moments that will give you all the feels. Savage North Chronicles Reading Order:1. THE DARKEST WINTERElle - Haunting shadows are nothing new to Elle St. James, she’s been running from them all her life. But since the outbreak spread from the lower forty-eight, new monsters lurk in the darkness. After Elle wakes from the fever, capable of horrific deeds, she fears she’s one of them.Jackson - After the world goes mad and takes his family with it, Jackson Mitchell tosses aside his badge and decides a bottle of bourbon and the depths of despair are preferable to any semblance of living. All of that changes, however, when a group of young survivors are in dire need of his help and Jackson sacrifices his blissful oblivion in order to keep them safe.Brought together under the worst possible circumstances, Elle and Jackson must face the inexplicable realities of the new world. Their past lives are over, and the arctic isn’t all that’s savage anymore.1.5 THE LONGEST NIGHT, prequel novellaLife seemed complicated for Sophie when she had teen pregnancy and her squeaky-clean reputation as the mayor’s daughter to worry about. Now, everything is changed. Bloodcurdling screams pierce the night air and lurid memories haunt feverish dreams.Alex is the new kid from the wrong side of the tracks, and it’s all he can do to keep his head down until his eighteenth birthday when he can leave his life in foster care behind him. But Alex doesn’t realize he and the quiet girl from class with lonely, blue eyes are fated in the most impossible way imaginable.2. MIDNIGHT SUNThe six of them survived the Alaskan winter after the Virus devastated the North, but summer in the land of the midnight sun is fraught with a brutality of its own—long, grueling days, mosquito-ridden evenings, and woods with lurking shadows more dangerous than grizzlies.2.5. FADING SHADOWSCrazed survivors and Ability-hungry madmen aren’t the only repercussions of the Virus, and when a new, unforeseen danger threatens the townspeople, Kat must embrace her unharnessed Ability she’s been trying for years to avoid.3. UNTAMEDBeau has learned to embrace his Ability, but when he loses his best friend, Beau’s world crumbles all over again. Brokenhearted, he embarks on a transformative journey of self-discovery, fraught with danger and adventure, and most unexpectedly, love. But the scars left in the wake of the Virus run deeper than Beau can possibly imagine.4. UNBROKENThea fears the moment she’ll have to use her telekinesis again. After all, the mere flick of her wrist in the heat of the moment could prove fatal for someone she loves, and she already has enough blood on her hands to last her a lifetime. So, Thea jumps at the chance to shrug off the shadows of her youth and prove to herself she’s unbroken.Hunter and Thea have never gotten along, and three weeks together could be Hunter’s undoing...just not in the way he’s expecting.

The William Kent Krueger Collection #4: Vermilion Drift, Northwest Angle, and Trickster's Point


William Kent Krueger - 2015
    Five are connected to a series of old unsolved disappearances. But the sixth is fresh. What’s worse, two of the victims—including the most recent—were killed with Cork’s gun. As Cork searches for answers, he must dig into his own past and that of his father, a well-respected man who harbored a ghastly truth. Northwest Angle: Amid the wreckage of a violent storm, Cork O’Connor and his daughter Jenny discover a body. Nearby, a baby boy lies hungry and dehydrated but still very much alive. Powerful forces in pursuit of the child follow them to the isolated Northwest Angle, where it’s impossible to tell who is friend or foe. Trickster’s Point: Cork O’Connor sits deep in the wilderness with his good friend Jubal Little—favored to become Minnesota’s first Native American elected governor—who is slowly dying with an arrow through his heart. But this is no hunting accident. The arrow is one of Cork’s. As he works to clear his name and track the killer who set him up, only Cork knows that his complex, passionate, ambitious friend was also capable of murder.

The True Story Of Kill Or Be Killed In The Real Old West


Eva Gillhouse - 2012
    Reveals True Story of Kill Or Be Killed Shootouts In The Real Wild West.Recently discovered memoir by one of the Old West's most feared (but virtually unknown today) gunfighter's and lawmen puts you behind a pair of Colt .45 six-guns and immerses you in the real life man-on-man fast draw shootouts, hell-bent-for-leather outlaw chases and lead dodgin' narrow escape in the Real Old West.If you've ever wondered what it was like to strap on a six-gun and have a face-off-in-the-street gunfight where only the fastest gunslinger walks away - - then rare eyewitness account of what it was like to live and die in the Real Old West is a must read.

Mo Hayder 2-Book Bundle: Birdman / The Treatment


Mo Hayder - 2012
    Download both ebooks for a special low price. Birdman Five bodies, all young women, all ritualistically murdered and dumped near the Millennium Dome in southeast London. A post-mortem examination tells the police they’re dealing with a sexual serial killer. Detective Inspector Jack Caffery knows he has only limited time before the sadistic killer strikes again. The Treatment In a residential neighbourhood in south London, a husband and wife are found tied up and imprisoned in their house. Their young son is missing. Detective Jack Caffery is called in to investigate. When the child’s body is found, he attempts to unravel the motive and sequence of events, especially when he discovers that a tragedy in his own past is indirectly connected to the murder.

Purr-Fect Mates


Ally Summers - 2017
    Grab a blanket and curl up with your new favorite big cats.SCORCH Drew Maddox has to find his fated mate.Drew Maddox has been given orders by the king of the jaguar tribe. It’s time to start building the Maddox empire. There is only one name on his list, a woman betrothed to him at birth. It's time to find her. Francesca March has no idea about her heritage or where she came from. Adopted by humans, she has lived a lonely existence as the only she-panther she knows. Long ago she gave up on happy endings, heroes, and trust. She’s never let anyone get close enough to learn her secret. That is until she meets a stranger on the side of the road. Drew knows time is running out. He has to convince Francesca to marry him in less than five days. But with his own secrets haunting him he struggles with how much to tell her without losing her. Can Francesca face the reality of what it truly means to be a she-panther, or will Drew keep her in the dark to fulfill his duty? Sparks fly. The sheets burn down. And every time they touch a flame ignites. Will fate keep them together, or tear them apart? SACRIFICE The chase is on.Josh Bauer expects his mate to be excited to see him, but when he shows up in her small town, she slams the door in his face.Tessa Cunningham has been an independent she-panther, running her own business and taking care of her mother. The last thing she wants is to let go of the control she has over her life.The more Josh chases her, the more she resists his sexy charm.Josh has an obligation to fulfill, but he learns that being a mate is worth sacrificing everything—even if that means losing Tessa.SEIZE Sometimes you have to take what you want.Donovan may come from a royal line of jaguar shifters, but he’s serving another king now. His mission is to uncover the plot for a shifter war. He never imagined guarding his tribe’s territory would put him in the path of she-panther, Caroline Addison. Caroline knows she only has a few weeks until her fated mate surfaces, so she takes a last minute vacation to escape. Only, she never knew she would find the one man she’d always been looking for.When Donovan and Caroline decide nothing can keep them apart, not even a shifter war, they realize there is a cost. And the price may be too high to pay. SHIFT Loyalties are tested, a war is upon them, and love knows no bounds.Case Maddox has finally found his mate.But the shifter war keeps brewing.Can he save his Tribe, and the woman he loves?Cadence is trying to find her place as a human in a world of shifters and as the mate of the jaguar king, but she's struggling. One night her world comes crashing down around her and she has to decide if she can even go on.Captured and held hostage. The only way for Cadence to survive may be to pledge herself to Case's ultimate rival.But Cadence has a secret that may be the key to her survival.

Mystere Parish: Family Inheritance Complete Collection: The Accused\The Betrayed\The Reunion


Jana Deleon - 2018
    But soon the sexy sheriff isn’t laughing. Someone—or something—is stalking the beautiful defense lawyer, turning her once-grand mansion into a house of horrors. The Betrayed One day on the job and contractor Zach Sargent is ready to believe the dilapidated old LeBeau mansion is haunted. Some intruder—earthly or not—is threatening the youngest LeBeau sister, back to claim her inheritance. And though Danae keeps her distance from the sexy hired hand, he falls for her in a heartbeat. The ReunionBodyguard to an heiress is Tyler Duhan’s idea of hell. The steely, sexy ex-marine has heard—and dismissed—the gossip about the haunted old LeBeau mansion and its “cursed” heiresses. Now headstrong Joelle has arrived to reunite with her long-lost sisters. And as much as he wants her, he needs to keep his distance—or suffer the fatal consequences.

Unix Network Programming, Volume 1: Networking APIs - Sockets and XTI


W. Richard Stevens - 1990
    You need UNIX Network Programming, Volume 1, Second Edition. In this book, leading UNIX networking expert W. Richard Stevens offers unprecedented, start-to-finish guidance on making the most of sockets, the de facto standard for UNIX network programming-as well as extensive coverage of the X/Open Transport Interface (XTI). Stevens begins by introducing virtually every basic capability of TCP and UDP sockets, including socket functions and options, I/O multiplexing, and name and address conversions. He presents detailed coverage of the Posix.1g standard for sockets and the Posix threads. He also introduces advanced techniques for: Establishing IPv4/IPv6 interoperability. Implementing non-blocking I/O. Routing sockets. Broadcasting and multicasting. IP options. Multithreading. Advanced name and address conversions. UNIX domain protocols. Raw sockets. Learn how to choose among today's leading client/server design approaches, including TCP

Perl Cookbook


Tom Christiansen - 1998
    Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include: • Manipulating strings, numbers, dates, arrays, and hashes • Pattern matching and text substitutions • References, data structures, objects, and classes • Signals and exceptions • Screen addressing, menus, and graphical applications • Managing other processes • Writing secure scripts • Client-server programming • Internet applications programming with mail, news, ftp, and telnet • CGI and mod_perl programming • Web programmingSince its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether you're a novice or veteran Perl programmer, you'll find Perl Cookbook, 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic you'd want to know about. You can get by without having this book in your library, but once you've tried a few of the recipes, you won't want to.

Tmux 2: Productive Mouse-Free Development


Brian P. Hogan - 2016
    The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.3, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row.You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.3, you can improve your productivity and regain your focus. This book will show you how.This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10.Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system.Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness


Steven Levy - 2006
    A technology columnist for Newsweek goes inside Apple Computer and into the heads of millions of music lovers to show how CEO Steve Jobs and his team of engineers, programmers, and designers created a product that has become a business and cultural blockbuster.

Head First C


David Griffiths - 2011
    With a unique method that goes beyond syntax and how-to manuals, this guide not only teaches you the language, it helps you understand how to be a great programmer. You'll learn key areas such as language basics, pointers and pointer arithmetic, and dynamic memory management. Advanced topics include multi-threading and network programming—topics typically covered on a college-level course.This book also features labs: in-depth projects intended to stretch your abilities, test your new skills, and build confidence. Head First C mimics the style of college-level C courses, making it ideal as an accessible textbook for students.We think your time is too valuable to waste struggling with new concepts. Using the latest research in cognitive science and learning theory to craft a multi-sensory learning experience, Head First C uses a visually rich format designed for the way your brain works, not a text-heavy approach that puts you to sleep.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Machine Learning for Dummies


John Paul Mueller - 2016
    Without machine learning, fraud detection, web search results, real-time ads on web pages, credit scoring, automation, and email spam filtering wouldn't be possible, and this is only showcasing just a few of its capabilities. Written by two data science experts, Machine Learning For Dummies offers a much-needed entry point for anyone looking to use machine learning to accomplish practical tasks.Covering the entry-level topics needed to get you familiar with the basic concepts of machine learning, this guide quickly helps you make sense of the programming languages and tools you need to turn machine learning-based tasks into a reality. Whether you're maddened by the math behind machine learning, apprehensive about AI, perplexed by preprocessing data--or anything in between--this guide makes it easier to understand and implement machine learning seamlessly.Grasp how day-to-day activities are powered by machine learning Learn to 'speak' certain languages, such as Python and R, to teach machines to perform pattern-oriented tasks and data analysis Learn to code in R using R Studio Find out how to code in Python using Anaconda Dive into this complete beginner's guide so you are armed with all you need to know about machine learning!

Excel Dashboards & Reports


Michael Alexander - 2010
    Offering a comprehensive review of a wide array of technical and analytical concepts, Excel Reports and Dashboards helps Excel users go from reporting data with simple tables full of dull numbers, to presenting key information through the use of high-impact, meaningful reports and dashboards that will wow management both visually and substantively.Details how to analyze large amounts of data and report the results in a meaningful, eye-catching visualization Describes how to use different perspectives to achieve better visibility into data, as well as how to slice data into various views on the fly Shows how to automate redundant reporting and analyses Part technical manual, part analytical guidebook, Excel Dashboards and Reports is the latest addition to the Mr. Spreadsheet's Bookshelf series and is the leading resource for learning to create dashboard reports in an easy-to-use format that's both visually attractive and effective.