Pi Agency (Rashmi Purohit, #1)


Neelabh Pratap Singh
    With no future in Indian law enforcement, she turned to working alongside the law. Now running her own agency out of her claustrophobic basement, Rashmi is dying for a notable case and a big break.A wealthy entrepreneur with a troubled, drug-addicted son seems like the perfect client. But when Rashmi and her impetuous, barely-competent employees stumble into a Dark Web-based investment conspiracy, the detective knows she has kicked a hornet’s nest. Rashmi might just solve the case – but only if it doesn’t kill her, destroy her agency, or make her betray her father’s legacy one last time.

Mapping Love


Ashwiny Iyer Tiwari
    My body still hurts. It has been some time since Oorja Chaturvedi has come home; but the wounds she suffered, at the hands of the very people who so aptly named her, cut deep. Her relationship with her father was barely strung together with a few words. But when her mother dies, the woman whose nagging love was both her comfort and her secret hiding place from the world, new grief melds with old bitterness. Reeling from the loss, Oorja decides to come back to India, only to find her estranged father missing. Her search leads her to her grandfather, a man who had lived all his life among books and forest, withering away in his house. As she tries to grapple with her grief for a dying grandfather, she unexpectedly finds love and solace in the arms of a man who inherits her grandfather’s estate. But before she can decide what Anang and her own future together hold, Oorja must first untangle the secrets of their shared past. A quiet gut-punch of a debut, acclaimed filmmaker Ashwiny Iyer Tiwari’s novel, Mapping Love is heartbreakingly brave and equally delicate. It is a story that digs its claws into you and doesn't let go, long after you've finished it.

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

Astrid's War: Attack on the USS Valley Forge


Alan Householder - 2019
    

Saunders Q & A Review for the NCLEX-RN Examination Edition 3


Linda Anne Silvestri - 1999
    Like all of Linda Silvestri review books, detailed rationales are provided for all answer choices, plus comprehensive test-taking strategies, and references to Elsevier nursing textbooks. This review also includes many critical thinking and alternate item formats, plus a comprehensive exam consisting of 300 questions.

Life is What Matters


Alka Dixit - 2018
    BRAND NEW, Exactly same ISBN as listed, Please double check ISBN carefully before ordering.

High Performance Browser Networking


Ilya Grigorik - 2013
    By understanding what the browser can and cannot do, you’ll be able to make better design decisions and deliver faster web applications to your users.Author Ilya Grigorik—a developer advocate and web performance engineer at Google—starts with the building blocks of TCP and UDP, and then dives into newer technologies such as HTTP 2.0, WebSockets, and WebRTC. This book explains the benefits of these technologies and helps you determine which ones to use for your next application.- Learn how TCP affects the performance of HTTP- Understand why mobile networks are slower than wired networks- Use best practices to address performance bottlenecks in HTTP- Discover how HTTP 2.0 (based on SPDY) will improve networking- Learn how to use Server Sent Events (SSE) for push updates, and WebSockets for XMPP chat- Explore WebRTC for browser-to-browser applications such as P2P video chat- Examine the architecture of a simple app that uses HTTP 2.0, SSE, WebSockets, and WebRTC

The Black Tide: Boxed Set


Baileigh Higgins
    The Black Tide - OutbreakWhen a worldwide pandemic decimates the population, Ava's life takes a terrifying turn for the worse. Threatened with starvation, enslavement, and death, life becomes a daily struggle for survival.The Black Tide - ContagionAfter finding a new home, Ava battles to keep those under her care safe and protected. She is confronted daily by new dangers, while struggling to contain her grief over the loss of her lover, Brian. Nonetheless, she is determined to build a new tomorrow for them all.The Black Tide - UprisingKidnapped by the followers of a mysterious new enemy, General Hagen, Ava finds herself lost among a sea of prisoners with no hope of rescue. She quickly realizes the only means of escape lies within her own hands.If you enjoy suspense-filled, character-driven end of the world scenarios, then you'll love this series. The Black Tide offers a chilling look at a post-apocalyptic future decimated by a killer virus where every decision could mean the difference between life and death.

Diary Of An 80s Computer Geek: A Decade of Micro Computers, Video Games & Cassette Tape


Steven Howlett - 2014
    The 1980s were certainly loud, often garish and utterly fabulous - no matter how embarrassing the outfits were.There are so many elements, which made the 80s a truly great decade, but one of the greatest contributions, if not the greatest, is the mass introduction of affordable 8-bit home micro computers.These curious machines of geekdom changed the way we regarded computers and technology. No longer were they the sole perverse of tweed jacket clad scientists sporting unruly beards, micro computers were now forming a staple inventory in millions of homes.Much of the technology that we enjoy today, such as desktop computers, notebooks, tablets, gaming consoles and smart phones, all of which are often taken for granted, can be traced back to this innovative decade.If you were a child of the 80s and remember the joy of receiving your very first home computer or maybe a young adult who fondly remembers the excitement, then you will appreciate this unabashed reminiscence of a simpler time whose adolescent technological was on the cusp of great advancements.This book is intended as celebration and reflection of all the computer technology that made the 80s such a wonderful, pioneering period and follows the journey of a self confessed, teenaged computer geek who experienced and enjoyed every ground breaking moment, including publishing his own software.10 Print “The 80s are fab!”20 Goto 10RunAuthor's Comments:The current edition is dated 31st January 2016 and has been edited based on customer feedback.

The Implementation (TCP/IP Illustrated, Volume 2)


Gary R. Wright - 1995
    "TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.

Network Security Essentials: Applications and Standards


William Stallings - 1999
    Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Eve Of War


R.L. Giddings - 2020
    His old enemy, the Yakutians, having risen from defeat, are now in the ascendancy. And with their warships making cruel in-roads into Confederation space, the Admiralty is in desperate need of Faulkner’s experience.It’s a call he can’t refuse.Eve of War is the first book in the Silver Fleet series with books 2 and 3 to be published in the Spring of 2020. If you love Old Man’s War and Jack Campbell’s Lost Fleet books you’ll love this epic military sci-fi series.

The Practice of System and Network Administration


Thomas A. Limoncelli - 2001
    Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protege. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even the most advanced experts through difficult projects.The book's four major sections build your knowledge with the foundational elements of system administration. These sections guide you through better techniques for upgrades and change management, catalog best practices for IT services, and explore various management topics. Chapters are divided into The Basics and The Icing. When you get the Basics right it makes every other aspect of the job easier--such as automating the right things first. The Icing sections contain all the powerful things that can be done on top of the basics to wow customers and managers.Inside, you'll find advice on topics such asThe key elements your networks and systems need in order to make all other services run better Building and running reliable, scalable services, including web, storage, email, printing, and remote access Creating and enforcing security policies Upgrading multiple hosts at one time without creating havoc Planning for and performing flawless scheduled maintenance windows Managing superior helpdesks and customer care Avoiding the -temporary fix- trap Building data centers that improve server uptime Designing networks for speed and reliability Web scaling and security issues Why building a backup system isn't about backups Monitoring what you have and predicting what you will need How technically oriented workers can maintain their job's technical focus (and avoid an unwanted management role) Technical management issues, including morale, organization building, coaching, and maintaining positive visibility Personal skill techniques, including secrets for getting more done each day, ethical dilemmas, managing your boss, and loving your job System administration salary negotiation It's no wonder the first edition received Usenix SAGE's 2005 Outstanding Achievement Award!This eagerly anticipated second edition updates this time-proven classic:Chapters reordered for easier navigationThousands of updates and clarifications based on reader feedbackPlus three entirely new chapters: Web Services, Data Storage, and Documentation

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

The Protocols (TCP/IP Illustrated, Volume 1)


W. Richard Stevens - 1993
    In eight chapters, it provides the most thorough coverage of TCP available. It also covers the newest TCP/IP features, including multicasting, path MTU discovery and long fat pipes. The author describes various protocols, including ARP, ICMP and UDP. He utilizes network diagnostic tools to actually show the protocols in action. He also explains how to avoid silly window syndrome (SWS) by using numerous helpful diagrams. This book gives you a broader understanding of concepts like connection establishment, timeout, retransmission and fragmentation. It is ideal for anyone wanting to gain a greater understanding of how the TCP/IP protocols work.