Book picks similar to
Mpls-Enabled Applications: Emerging Developments and New Technologies by Ina Minei
networking
technical
ccie
computer-networking
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
Binocular Highlights
Gary Seronik - 2007
Each object is plotted on a detailed, easy-to-use star map, and most of these sights can be found even in a light-polluted sky. Also included are four seasonal all-sky charts that help locate each highlight. You don't need fancy or expensive equipment to enjoy the wonders of the night sky. In fact, as even experienced star gazers know, to go beyond the naked-eye sky and delve deep into the universe, all you need are binoculars ? even the ones hanging unused in your closet. If you don't own any, Binocular Highlights explains what to look for when choosing binoculars for star gazing and provides observing tips for users of these portable and versatile mini-telescopes. Sprial-bound with readable paper spine, full color throughout.
Fast Tract Digestion Heartburn
Norman Robillard - 2012
Fast Tract Digestion Heartburn is the first book to define and address the real cause of acid reflux. Acid reflux occurs as a result of digestive malabsorption of five difficult-to-digest carbohydrates. It leads to the overgrowth of gas-producing bacteria in the small intestine and the gas pressure drives acid reflux. Dropping a Mentos into a bottle of Coke is the perfect illustration of this phenomenon. Unfortunately, PPI drugs do not address the real cause, but also cause serious side effects including vitamin and mineral malabsorption, bone fractures, pneumonia, low blood magnesium levels, bacterial overgrowth, C diff infection and pneumonia as explained in the book.Fast Tract Digestion Heartburn offers science-based food choices and recipes (Fast Tract Diet) to limit the five difficult-to-digest carbohydrates, so that you can feel relief within a few days Also, it enables you to self-manage all of the symptoms of acid reflux going forward. The Fast Tract Diet is based on a scientific formula called Fermentation Potential (FP). FP is the key measure regardless of the carbohydrate count. Limiting foods with high FP will help control the overgrowth of bacteria in the small intestine and, as a result, acid reflux. The Fast Tract Diet was clinically tested on reflux sufferers in the Boston area. The results were overwhelming and proved the effectiveness of the diet as an alternative to proton pump inhibitor drugs.
To the Stars and Back: Space Opera to Cyberpunk 5 Book Box Set
C.F. Barnes - 2015
If you like fun, adventure, and interesting tech, you’ll be sure to love something within this collection. Comprising three full length novels, and two novellas, these stories will keep you entertained for many hours. Warning: Readers might not want to come back to the real world after adventuring through these stories. Hollow Space: Venture Forced to hyperjump during a brutal ambush, Sara Lorelle, navigator of the the last human colony ship, discovers they’ve jumped to somewhere that shouldn’t exist. Trapped inside a pocket universe known only as Hollow Space, where technology inexplicably fails, Sara and her crew have to face the lethal politics of their only destination: Haven—a decrepit space station, home to hostile aliens and rival factions that soon sees the Venture crew up to their necks in trouble. With their only hope placed in Tairon Cauder, a reckless scoundrel, they will battle impossible species, confront their fears, and uncover ancient and terrible secrets. In a place where those who shoot first live the longest, the Venture crew will have to push their limits if they are to save themselves and the human race from extinction. Hollow Space: Shadowkill Kina wants to be an assassin—to join the mysterious Wraiths and secure her future on the space station of Haven. A place where it’s kill or be killed and career options are limited. But Haven is not your granddad’s space station. It’s rotten to the core and every scumbag is out for one thing only: themselves. With just her two daggers for protection, Kina is thrown into the darkness to confront a pack of bounty hunters eager to end her ambitions—and life. Code Breakers: Alpha In a post-apocalyptic future, humanity survives within a single domed city run by a shadowy benefactor known only as The Family. Each week the death lottery claims more lives and Gerry Cardle, head of the lottery, inexplicably finds himself the next on the list. Something's wrong with the system. A deadly artificial intelligence has breached security. Gerry has just 7 days to live. Forced off the grid, Gerry has to do the unthinkable: willingly leave the city. What he finds in the abandoned lands will shatter his perception of what it means to be human. Everything he had been told before was a lie. Code Breakers: Beta The fanatical Red Widows sweep destruction across the abandoned lands. Their aggression threatens to destroy the city Gerry had risked his life to save. Petal, the woman Gerry has come to love is dying. The despotic cabal, The Family, demand he brings her to them, but she's missing, running from the Widows, searching for the truth of her origins before it's too late. When their paths cross, Petal and Gerry will hold the fate of humankind in their hands—if they can survive the malevolent digital entity that stalks them from the shadows. The Daedalus Code When agents Phaedra and Aegeus of New Crete's Intelligent Data Enforcement Agency are tasked to find five missing Artificial Intelligence students, their single lead takes them to a notorious hacker known as 'The Cretian.' With his help, they uncover a terrible truth: Ariadne, one of the students, is involved with a rogue AI program called The Daedalus Project. The AI is out of control, people are going missing, and a great swathe of the world’s data is being secured within its digital labyrinth.
Java 2: The Complete Reference
Herbert Schildt - 2000
This book is the most complete and up-to-date resource on Java from programming guru, Herb Schildt -- a must-have desk reference for every Java programmer.
The Dispatch Rider (K Company Book 3)
Robert Broomall - 2013
He's also the guy you want next to you when things go bad. While carrying dispatches, Link meets Prudence Wainwright, a pious Eastern woman whose husband has been murdered and whose daughter has been kidnapped by a gang of renegade Jayhawkers. Teaming up reluctantly, Link and Prudence must cross hundreds of miles of hostile territory and recapture Hope before her kidnappers sell her to the Comancheros and she is lost to them forever.
The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Charles Kozierok - 2005
It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.
The Conscientious Marine Aquarist: A Commonsense Handbook for Successful Saltwater Hobbyists
Robert M. Fenner - 1996
As a pragmatic, hands-on guide for beginning to intermediate hobbyists, The Conscientious Marine Aquarist demystifies the process of planning, setting up, stocking, and managing a beautiful, thriving slice of the tropical ocean. A leading advocate for the responsible collection and care of wild-caught specimens, Fenner starts with the basics -- "What is a fish?" -- and proceeds to give the reader the scientific background and expert-level secrets to being a smarter consumer, better steward, and more successful marine aquarium keeper.
802.11 Wireless Networks: The Definitive Guide
Matthew S. Gast - 2002
Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
Learn Visually: Basic Excel Formulae: Take your spreadsheets and learn some of the key powerful formulae which will allow you to analyse and present your data effectively
Diane Griffiths - 2014
You have access to so much information - but where do you start and what is actually useful?! This particular book takes you right back to formula basics; exactly what a formula is, how to create one and what formulas can do. Then you'll learn about using functions in your formulas, a useful Excel feature which is designed to make your life easier. It will give you the starting blocks that you need in order to present and make sense of a spreadsheet in a quick and easy way that will give your confidence and career a boost. Formulae include: - Basic Arithmetic - SUM - IF - AND/OR - COUNT / COUNTA - AVERAGE / MAX / MIN - VLOOKUP / HLOOKUP - Bonus - Validation
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
A Family Affair - A Free Preview of the First 7 Chapters
ReShonda Tate Billingsley - 2013
Lorraine Dawson is Olivia’s whole world, and now Olivia insists on being there for her. But when Lorraine learns Olivia is sacrificing college for her sake, her heartache triggers a series of shattering events that results in Olivia discovering her father, a man she was told had died years ago. But he is alive and well—and he’s the powerful CEO of one of the country’s richest corporations.With her best friend urging her to claim a much-deserved chunk of Bernard Wells’s fortune, Olivia seeks out his Los Angeles mansion. But it’s not money she wants—it’s answers: Why did he abandon Lorraine when Olivia was three years old? Why did they suffer in poverty while he gave his "real" wife and son a life of luxury? Opening up the past, however, is more complicated than Olivia—or Bernard—expected, and the pain of yesterday’s sins must be confronted before true healing and a bright tomorrow can begin.
Good Italy, Bad Italy: Why Italy Must Conquer Its Demons to Face the Future
Bill Emmott - 2012
Now it is viewed as a major threat to the future of the Euro, indeed to the European Union as a whole. Italy's political system is shorn of credibility as it struggles to deal with huge public debts and anemic levels of economic growth. Young people are emigrating in droves, frustrated at the lack of opportunity, while older people stubbornly cling to their rights and privileges, fearful of an uncertain future.In this lively, up-to-the-minute book, Bill Emmott explains how Italy sank to this low point, how Italians feel about it, and what can be done to return the country to more prosperous and more democratic times. With the aid of numerous personal interviews, Emmott analyzes "Bad Italy"—the land of disgraced Prime Minister Silvio Berlusconi, an inadequate justice system, an economy dominated by special interests and continuing corruption—against its contrasting foil "Good Italy," the home of enthusiastic entrepreneurs, truth-seeking journalists, and countless citizens determined to end mafia domination for good.
The Midwife's Playlist
Piper Lennox - 2019
The day he left, he ruined every single song.My name is Easton, and I catch babies. When I’m called to a teen mom’s birth in the middle of a thunderstorm, the last person I expect to see is Caroline. No, scratch that: the last person I expect to see—the last person I want to see—is her brother. Six years, and the sight of Ford still wrings my heart dry. His voice still melts me. His smirk still pisses me off in ways he can’t even imagine. Our small, Southern town broadcasts rumors 24/7, yet no one thought to tell me Ford was back. And now I’m stuck living near him all over again—stuck replaying the hell he put me through the last summer I saw him. I swore I wouldn’t give him the time of day. I failed. But I sure as hell won’t give him a second chance.* * *Once upon a time, I thought Easton Lawrence would be the girl who saved me. I didn’t return to sleepy little Hillford for redemption; I don’t deserve it. I didn’t even return for her. I came back because my family needs me. As soon as this is over, I’m out of here. Gone. A ghost.At least, that was my plan. I didn’t count on seeing Easton again—much less confessing I’m still in love with her. The day we met, she hated me: eight years old and sworn enemies. But as the years passed, I changed her mind. So maybe there’s hope. Maybe I can change it again.
Service-Oriented Design with Ruby and Rails
Paul Dix - 2010
Today, Rails developers and architects need better ways to interface with legacy systems, move into the cloud, and scale to handle higher volumes and greater complexity. In Service-Oriented Design with Ruby and Rails Paul Dix introduces a powerful, services-based design approach geared toward overcoming all these challenges. Using Dix's techniques, readers can leverage the full benefits of both Ruby and Rails, while overcoming the difficulties of working with larger codebases and teams. Dix demonstrates how to integrate multiple components within an enterprise application stack; create services that can easily grow and connect; and design systems that are easier to maintain and upgrade. Key concepts are explained with detailed Ruby code built using open source libraries such as ActiveRecord, Sinatra, Nokogiri, and Typhoeus. The book concludes with coverage of security, scaling, messaging, and interfacing with third-party services. Service-Oriented Design with Ruby and Rails will help you Build highly scalable, Ruby-based service architectures that operate smoothly in the cloud or with legacy systems Scale Rails systems to handle more requests, larger development teams, and more complex code bases Master new best practices for designing and creating services in Ruby Use Ruby to glue together services written in any language Use Ruby libraries to build and consume RESTful Web services Use Ruby JSON parsers to quickly represent resources from HTTP services Write lightweight, well-designed API wrappers around internal or external services Discover powerful non-Rails frameworks that simplify Ruby service implementation Implement standards-based enterprise messaging with Advanced Message Queuing Protocol (AMQP) Optimize performance with load balancing and caching Provide for security and authentication