The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


Charles Kozierok - 2005
    It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.

Kindle Fire For Dummies


Nancy C. Muir - 2011
    It walks you through all the tablet's features, shows you how to set up the device, navigate the touchscreen interface, buy music, stream video, download apps, and read e-books from Amazon.com. The book demystifies this all-new tablet and provides a handy reference that can be conveniently downloaded and read right on your Kindle Fire device.Looks at the new Kindle Fire, which features revolutionary technology and access to cool new services; this e-book explains both in plain English Is only available in e-book format and downloads directly to the Kindle Fire and other Kindle devices, making it a handy reference you can take virtually anywhere Covers not only the basics, but also tips and tricks for taking full advantage of the Kindle Fire and the services of Amazon's online stores Kindle Fire For Dummies is packed with powerful tips designed to help you get more punch out of your Kindle Fire tablet.

How You Play the Game: A Philosopher Plays Minecraft (Kindle Single)


Charlie Huenemann - 2015
    At a glance, it bears few similarities to any place we know and inhabit. But upon closer examination, the differences between this complex virtual reality and our own might not be as vast as we think. In “How You Play the Game,” author and philosopher Charlie Huenemann looks philosophically at the game of Minecraft (“What is the point of this game? How does one win? Well, this depends on what you want to do”) and grapples with the ethical conundrums, existential crises and moral responsibilities of the virtual realm. From the Overworld to the Ender Dragon, Huenemann offers an entertaining, insightful and often hilarious examination of Minecraft and the strange worlds—both virtual and not—surrounding it.Charlie Huenemann is a Professor of Philosophy at Utah State University. He writes for 3quarksdaily, and has published several books on the history of philosophy.Cover design by Adil Dara.

Foundations of Software Testing ISTQB Certification


Rex Black - 2006
    Completely updated to comprehensively reflect the most recent changes to the ISTQB Foundation Syllabus, the book adopts a practical, hands-on approach, covering the fundamental topics that every system and software tester should know. The authors are themselves developers of the ISTQB syllabus and are highly respected international authorities, teachers and authors within the field of software testing.

Cloud Computing for Dummies


Judith Hurwitz - 2009
    If you've been put in charge of implementing cloud computing, this straightforward, plain-English guide clears up the confusion and helps you get your plan in place.You'll learn how cloud computing enables you to run a more green IT infrastructure, and access technology-enabled services from the Internet ("in the cloud") without having to understand, manage, or invest in the technology infrastructure that supports them. You'll also find out what you need to consider when implementing a plan, how to handle security issues, and more.Cloud computing is a way for businesses to take advantage of storage and virtual services through the Internet, saving money on infrastructure and support This book provides a clear definition of cloud computing from the utility computing standpoint and also addresses security concerns Offers practical guidance on delivering and managing cloud computing services effectively and efficiently Presents a proactive and pragmatic approach to implementing cloud computing in any organization Helps IT managers and staff understand the benefits and challenges of cloud computing, how to select a service, and what's involved in getting it up and running Highly experienced author team consults and gives presentations on emerging technologies Cloud Computing For Dummies gets straight to the point, providing the practical information you need to know.

Hidden In Plain Sight 10: How To Program A Quantum Computer


Andrew H. Thomas - 2018
     This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

The Legend of Mary Death


Loren K. Jones - 2019
    Marydyth Shalina Forlan Zel’Karyn was gifted with remarkable speed and reflexes, which she turned into sword skill few could match. Wielding the dragon blood sword, Sang Del Dracl, Marydyth made a name for herself with the Army of Coravia. But it was a name she wasn’t happy with; Mary Death. Marydyth is forced to flee to Evandia and embraces her fate. Now a lady of Evandia, Mary Death retires to a life of leisure in the palace of King Oradan. But retirement is not her fate. Made a Royal Guard in honor of her service to the kingdom, Marydyth continues her legend as a sword instructor. But she is still one of the most deadly swordswomen to have ever lived, and that skill is needed to protect her new king and kingdom. And protect them she will, even unto her own death.

The Way of Sacrifice


Tony Corden - 2021
    Taken from poverty at the extremity of Tarlonin's New Dominions, she is brought to the centre of the Empire to become a mage.[Spoiler (maybe): Weaves of Empire is set in the same universe as The Stork Tower. The connections will eventually become more apparent; the intervening years will be fleshed out in other series (not yet written).]

Shadow of Oblivion


Richard Tongue - 2019
    When war erupts, the heart of their battle fleet is Goliath, the largest battleship ever built, the result of years of work in hidden shipyards lost in the depths of space. Earth has no answer to her, no ship in her fleet a match for the overwhelming power of the warship. Defeat seems inevitable. Until a renegade Admiral concocts a final, desperate plan. Only one ship, an experimental warship, the Avenger, might possibly stand a chance against the might of Goliath. One ship, with a picked crew, a crew with nothing to lose and everything to gain, gathered from the dregs of Earth’s space forces, all facing charges ranging from murder to mutiny, but all of them the best in their respective fields. The last hope for the Terran Republic. The last, desperate hope for victory.

When It's Too Late to Tell (When it's . . .#1)


J. Evan Johnson - 2010
    To tell is to inform. When it's Too Late to Tell features four characters, Mark, Craig, Jade and Berta, all holding issues from the past that suffocate every lasting relationship they have. Mark, an elementary school teacher, and his wife Jade, a pharmacy technician, hold deep secrets from each other; secrets that cause a rift in their marriage. Mark's best friend Craig lives his days as a financial planner, struggling with the idea of God, questioning His existence each day. Indeed, Craig once believed and held strong to his faith, formerly being a youth minister for a well-known church, but some strenuous events turned his life upside down. If it weren't for a helping hand, his life would have ceased to exist. Berta, Craig's assistant, stands to be the most faithful, although the horrors that happened to her in her past would allow anything but. One part to her past in particular binds her, forcing her to believe that her entire existence boils down to a single man's dying wish. In this mesmeric story of relationships, each of the four must realize what issues truly hold them back and what issues to reveal before it is too late.

Routing Tcp/Ip, Volume II (CCIE Professional Development)


Jeff Doyle - 2001
    Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle's practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional's library. Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management.

In The Shadow of Ziammotienth


Michael Anderle - 2021
    But will she be able to evade its grasp?Is Ziammotienth just a story of legends and minstrels or much more? Commerce, adventure, and intrigue swirl around the young thief as she fights her way into a far larger world than she had expected to experience.

Family Album


Patricia Kay - 2002
    But under this surface perfection is a secret Hannah has tried to bury, one that rears its painful head each year on her birthday. When David Conway enters her life just as she turns thirty-eight, that secret will be exposed. Can Hannah's relationship with her husband and daughter survive when they discover she is not the person they thought her to be? Patricia Kay once again delivers an emotional story centering around family relationships, one of her favorite themes.

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.