The Belt: Complete Trilogy


Gerald M. Kilby - 2018
    The ship contains an experimental quantum device, lost while en route to a research colony on Europa. On Earth, powerful corporate forces are moving to resume unrestricted, inter-AI communications, their objective being to gain complete dominion over the colonized solar system. But the outer worlds are mobilizing to prevent them from achieving their objective, a fight back which is being led by Solomon, a sentient quantum intelligence (QI), also on Europa. However, once word of the crew’s discovery gets out, they soon realize that ownership of this technology could fundamentally change the balance of power within the solar system, and they now find themselves at the very nexus of a system-wide conflict. Their fight for survival plays out across the solar system, from the mining outposts of the asteroid belt to the moons of Jupiter and Saturn, and from the great Martian city of Jezero to the irradiated wastelands on Earth. This is an epic tale of humanity’s struggle for survival and meaning in a time when artificial intelligence has finally out-paced our own ability to control it. About The Belt: The story is set a century or so into the future where humanity has colonized most of the inner solar system. The asteroid belt (The Belt) is now a hive of mining activity and ships ply the trade routes to Earth and Mars. The technology depicted, for the most part, is what I consider to be technically plausible, although I do stretch it a little with quantum entanglement. That said, you won’t need a calculator or a slide-rule to enjoy the story.

Build Your Own Database Driven Website Using PHP & MySQL


Kevin Yank - 2001
    There has been a marked increase in the adoption of PHP, most notably in the beginning to intermediate levels. PHP now boasts over 30% of the server side scripting market (Source: php.weblogs.com).The previous edition sold over 17,000 copies exclusively through Sitepoint.com alone. With the release of PHP 5, SitePoint have updated this bestseller to reflect best practice web development using PHP 5 and MySQL 4.The 3rd Edition includes more code examples and also a new bonus chapter on structured PHP Programming which introduces techniques for organizing real world PHP applications to avoid code duplication and ensure code is manageable and maintainable. The chapter introduces features like include files, user-defined function libraries and constants, which are combined to produce a fully functional access control system suitable for use on any PHP Website.

AWS Lambda: A Guide to Serverless Microservices


Matthew Fuller - 2016
    Lambda enables users to develop code that executes in response to events - API calls, file uploads, schedules, etc - and upload it without worrying about managing traditional server metrics such as disk space, memory, or CPU usage. With its "per execution" cost model, Lambda can enable organizations to save hundreds or thousands of dollars on computing costs. With in-depth walkthroughs, large screenshots, and complete code samples, the reader is guided through the step-by-step process of creating new functions, responding to infrastructure events, developing API backends, executing code at specified intervals, and much more. Introduction to AWS Computing Evolution of the Computing Workload Lambda Background The Internals The Basics Functions Languages Resource Allocation Getting Set Up Hello World Uploading the Function Working with Events AWS Events Custom Events The Context Object Properties Methods Roles and Permissions Policies Trust Relationships Console Popups Cross Account Access Dependencies and Resources Node Modules OS Dependencies OS Resources OS Commands Logging Searching Logs Testing Your Function Lambda Console Tests Third-Party Testing Libraries Simulating Context Hello S3 Object The Bucket The Role The Code The Event The Trigger Testing When Lambda Isn’t the Answer Host Access Fine-Tuned Configuration Security Long-Running Tasks Where Lambda Excels AWS Event-Driven Tasks Scheduled Events (Cron) Offloading Heavy Processing API Endpoints Infrequently Used Services Real-World Use Cases S3 Image Processing Shutting Down Untagged Instances Triggering CodeDeploy with New S3 Uploads Processing Inbound Email Enforcing Security Policies Detecting Expiring Certificates Utilizing the AWS API Execution Environment The Code Pipeline Cold vs. Hot Execution What is Saved in Memory Scaling and Container Reuse From Development to Deployment Application Design Development Patterns Testing Deployment Monitoring Versioning and Aliasing Costs Short Executions Long-Running Processes High-Memory Applications Free Tier Calculating Pricing CloudFormation Reusable Template with Minimum Permissions Cross Account Access CloudWatch Alerts AWS API Gateway API Gateway Event Creating the Lambda Function Creating a New API, Resource, and Method Initial Configuration Mapping Templates Adding a Query String Using HTTP Request Information Within Lambda Deploying the API Additional Use Cases Lambda Competitors Iron.io StackHut WebTask.io Existing Cloud Providers The Future of Lambda More Resources Conclusion

Linux Administration Handbook


Evi Nemeth - 2006
    Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments. It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.) There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years. Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics." Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 href="http://www.barnesandnoble.com/newslet... Only

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Windows Powershell in Action


Bruce Payette - 2007
    In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.

CCNP ROUTE 642-902 Official Certification Guide (Official Cert Guide)


Wendell Odom - 2009
    Book annotation not available for this title.Title: CCNP ROUTE 642-902Author: Odom, WendellPublisher: Pearson P T RPublication Date: 2010/02/09Number of Pages: 730Binding Type: HARDCOVERLibrary of Congress: 2009049908

bash Pocket Reference


Arnold Robbins - 2010
    Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. You'll quickly find answers to annoying questions that always come up when you're writing shell scripts -- What characters do you need to quote? How do you get variable substitution to do exactly what you want? How do you use arrays? -- and much more.If you're a user or programmer of any Unix variant, or if you're using bash on Windows, you'll find this pocket reference indispensable. This book covers:Invoking the ShellSyntaxFunctionsVariablesArithmetic ExpressionsCommand HistoryProgrammable CompletionJob ControlShell OptionsCommand ExecutionCoprocessesRestricted ShellsBuilt-in Commands

Linux System Programming: Talking Directly to the Kernel and C Library


Robert Love - 2007
    With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:A Linux kernel, C library, and C compiler overviewBasic I/O operations, such as reading from and writing to filesAdvanced I/O interfaces, memory mappings, and optimization techniquesThe family of system calls for basic process managementAdvanced process management, including real-time processesThread concepts, multithreaded programming, and PthreadsFile and directory managementInterfaces for allocating memory and optimizing memory accessBasic and advanced signal interfaces, and their role on the systemClock management, including POSIX clocks and high-resolution timers

Data Structures Using C++


D.S. Malik - 2003
    D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.

Safe Haven Wolves Box Set 1: Books 1-3, Gabby, Trina, Kate (Safe Haven Wolves Boxed Sets)


Sherry Foster - 2018
    But Trey knows his duty, protect the female at all cost. Then he meets Gabby and finds she is his mate. Now he has to find out where she came from, what she is running from and then convince her to stay. That may be easier said than done when he finds she has no knowledge of the shifter world.Gabby found a place to stay. Something deep inside her insists the area is safe, but Gabby has been on the run for five years, she knows no place is safe for long. They always find her. She doesn't know how, she doesn't know who, or even why, she just knows, they will find her. On top of that worry, she is sure she is going crazy, she has no explanation for the events occurring around her. And the wolves, they keep showing up around her cabin. Are they hungry?Can Trey convince Gabby he is her mate, and she is not going crazy? Can they find out who is chasing Gabby? Join Gabby and Trey as they search for answers and find more than anyone expects. TRINA Trina is done hiding. Jaden is done hunting. Desperate to find a mate, but longing to track down her sister, Trina's journey begins. She had no idea the turn her life would take once her twin left home. The events that led up to her family going into hiding haven't changed. Because female shifters are rare, to be procured at all cost, Trina and her family remain on the run from those who would detain her. However, she is determined that her freedom is her own. She belongs to no one until she and her wolf both agree upon a mate. But the list of people after her has just gotten larger.Jaden has no doubt the woman in saw in the dojo that day is his mate. For months now his wolf has been tearing up his insides in a need to claim her. The problem is, all traces of the girl disappeared the day they met. After exhausting every possible resource he has to find her, a glimmer of hope appears in the news in the form of wedding photos. Enraged to find his mate married to another he vows to make her a widow.Will Jaden cross the wrong people in his journey to get his mate?Can Trina stay free long enough to find Gabby?Will their journeys bring them together or destroy any chance of them finding each other? KATE They call her a guest. She knows she’s a prisoner. With females being so scarce some feel they should be collected and parceled out to males who deserve them. Others think they should be protected and given the choice of who they will call mate.Kate watched as her guardians were murdered. The killers don’t know she saw them. Claiming to rescue her they take her to a guarded location. They made one serious error, Kate isn’t what she seems. She is so much more.The only thing saving her from an unwelcome mating bond is her scent. The rogues believe her to be still underage. She isn’t.Now, in a desperate race against time, Kate must find a way to free herself and the others before anyone finds out her secret. She will have all the help she needs- if they can only locate her.But one male could change everything when he stumbles upon the prison where Kate is being held.

The Collection


Agatha Christie - 2021
    DavenheimThe Adventure of the “Western Star”The Tragedy at Marsdon ManorThe Million Dollar Bond RobberyThe Adventure of the Cheap FlatThe Mystery of the Hunter’s LodgeThe Kidnapped Prime MinisterThe Adventure of the Egyptian TombThe Adventure of the Italian NoblemanThe Case of the Missing WillThe Chocolate BoxThe Veiled LadyThe Lost MineThe Affair at the Victory BallThe Adventure of the Clapham CookThe Cornish MysteryThe Adventure of Johnnie WaverlyThe Double ClueThe King of ClubsThe Lemesurier InheritanceThe Plymouth ExpressThe Submarine PlansThe Market Basing MysteryThe Adventure of the Christmas Pudding

Holes: A Play


Louis Sachar - 2015
    This winner of the Newbery Medal and the National Book Award features Stanley Yelnats, a kid who is under a curse. A curse that began with his no-good-dirty-rotten-pig-stealing-great-great-grandfather and has since followed generations of Yelnats. Now Stanley has been unjustly sent to a boys' detention center, Camp Green Lake, where the warden makes the boys "build character" by spending all day, every day, digging holes five feet wide and five feet deep. It doesn't take long for Stanley to realize there's more than character improvement going on at Camp Green Lake: the warden is looking for something. Stanley tries to dig up the truth in this inventive and darkly humorous tale of crime and punishment-and redemption..

Red Runs the Plain


W.R. Benton - 2007
    Army Scout'Escaping from the Oto Indians who brutally slaughtered his whole family, fifteen-year-old Jarel Wade runs aimlessly into a snowstorm. On the verge of death he's rescued by a pair of cantankerous old mountain men as rugged as the mountains off which they live. Taken under their wing, Jarel proves himself worthy of the trail, but something's coming; something far more sinister that will test every ounce of his newly earned skills and mettle. A rogue former British Army officer is systematically exterminating the free trappers. He wants to corner the fur trade for himself, and he commands a pack of thieves, murderers and outcasts who know the mountains as well as they know how to dig Jarel a grave."RED RUNS THE PLAIN is a crackerjack story written by a craftsman at the top of his form. A whirlwind of a tale that will keep you turning pages."— Matt Braun

Merry Wrath Mysteries Boxed Set Vol. I


Leslie Langtry - 2016
    Instead of black bag drops in Bangkok, she now spends her time leading a young Girl Scout troop. But Merry's new simple life turns not-so-simple when an enemy agent shows up dead at scout camp. Suddenly Merry is forced to deal with her former life in order to preserve her future one. It doesn't help matters that the CIA sends in her former, sexy handler to investigate…or that the hot new neighbor across the street turns out to be the local detective in charge of her case. And when Merry is forced to take on a roommate in the voluptuous form of a turned KGB agent/bimbo, things become trickier than wet work in Waukegan or cookie sales in the spring. Nothing in the CIA or Girl Scouts' training manuals has prepared her for what comes next… Mint Cookie Murder (book #2) Ex-CIA agent turned suburban scout leader, Merry Wrath, is just trying to live a normal, quiet life. But all that goes out the window when a convicted traitor (who’s inconveniently not in his prison cell) dies on her doorstep, and an obese cat, who bears a disturbing resemblance to Hitler, decides to move in. To make things worse, it’s time for the annual troop cookie sale, her new boyfriend’s old college flame shows up to win him back, and someone’s shooting at Merry in the frozen foods section of the grocery store. Is the assassin after her or the cat? Is Riley, her hot former CIA handler, hitting on her? Is Rex, her boyfriend, going to dump her? Will she sell enough cookies to take her troop to Winter Sniper Camp? If Merry doesn't find answer to these questions soon, it may be too late! Marshmallow S'More Murder (book #3) What could be better for former CIA agent turned Girl Scout leader Merry Wrath than taking twelve little girls to Washington DC for a bit of summer fun? Almost anything. Unfortunately, between her girls terrorizing the Secret Service and "accidentally" destroying the hotel pool, Merry has her hands full with this troop. And when her former handler, Riley, is kidnapped Merry has to turn to an old friend from her spy days and her parents, Senator and Mrs. Czrgy, to help her wrangle the troop and rescue the man she once briefly called her boyfriend. Armed only with a perpetually AWOL parent, stalked by a runaway King Vulture, and plagued by a mysterious death from her past, Merry's mayhem weaves a wacky trail from moonshiners in the Blue Ridge Mountains, to the bowels of the Japanese Embassy, to the ductwork of the International Spy Museum. With things heating up with current boyfriend, Detective Rex Ferguson, can Merry decipher clues from her past to find ex¬-boyfriend Riley and finally solve the murder of Yakuza boss, Midori Ito, before the target on her back is filled with lead?