Rich God, Poor God: Why God Wants You to Prosper


Chinkee Tan
    

HTML Black Book: The Programmer's Complete HTML Reference Book


Steven Holzner - 2000
    An immediate and comprehensive answer source, rather than a diffuse tutorial, for serious programmers who want to see difficult material covered in depth without the fluff. Discusses XML, dynamic HTML, JavaScript, Java, and Perl CGI programming to create a full Web site programming package. Written by the author of several successful titles published by The Coriolis Group.

Electronic Dreams: How 1980s Britain Learned to Love the Computer


Tom Lean - 2016
    In those heady early days of computing, Britannia very much ruled the digital waves.Electronic Dreams looks back at how Britain embraced the home computer, and at the people who drove the boom: entrepreneurs such as Clive Sinclair and Alan Sugar seeking new markets; politicians proclaiming economic miracles; bedroom programmers with an unhealthy fascination with technology; and millions of everyday folk who bought into the electronic dream and let the computer into their lives. It is a history of home computers such as the Commodore VIC20, BBC Micro, and ZX Spectrum; classic computer games like Manic Miner and Elite; the early information networks that first put the home online; and the transformation of the computer into an everyday object in the British home.Based on interviews with key individuals, archive sources, and study of vintage hardware and software, and with a particular focus on the computer's place in social history, Electronic Dreams is a nostalgic look at how a depressed 1980s Britain got over its fear of microchips and embraced the computer as a “passport to the future.”

Architecting for the AWS Cloud: Best Practices (AWS Whitepaper)


Amazon We Services - 2016
    It discusses cloud concepts and highlights various design patterns and best practices. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

Business Data Communications and Networking


Jerry FitzGerald - 1995
    Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field.Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared.

Microsoft Excel Essential Hints and Tips: Fundamental hints and tips to kick start your Excel skills


Diane Griffiths - 2015
    We look at how to set up your spreadsheet, getting data into Excel, formatting your spreadsheet, a bit of display management and how to print and share your spreadsheets. Learn Excel Visually The idea of these short handy bite-size books is to provide you with what I have found to be most useful elements of Excel within my day-to-day work and life. I don’t tell you about all the bells and whistles – just what you need on a daily basis. These eBooks are suitable for anyone who is looking to learn Excel and wants to increase their productivity and efficiency, both at work and home. Please bear in mind I don’t cover all functionality of all areas, the point is that I strip out anything that’s not useful and only highlight the functionality that I believe is useful on a daily basis. Don’t buy a huge textbook which you’ll never fully read, pick an eBook which is most relevant to your current learning, read it, apply it and then get on with your day.

Foundations of Software Testing: ISTQB Certification


Dorothy Graham - 2006
    The coverage also features learning aids.

Advanced Swift


Chris Eidhof - 2016
    If you have read the Swift Programming Guide, and want to explore more, this book is for you.Swift is a great language for systems programming, but also lends itself for very high-level programming. We'll explore both high-level topics (for example, programming with generics and protocols), as well as low-level topics (for example, wrapping a C library and string internals).

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Apache: The Definitive Guide: Vital Information for Apache Programmers and Administrators


Ben Laurie - 1997
    Apache: The Definitive Guide, written and reviewed by key members of the Apache Group, is the only complete guide on the market today that describes how to obtain, set up, and secure the Apache software.Apache was originally based on code and ideas found in the most popular HTTP server of the time: NCSA httpd 1.3 (early 1995). It has since evolved into a far superior system that can rival (and probably surpass) almost any other Unix-based HTTP server in terms of functionality, efficiency, and speed. The new version now includes support for Win32 systems. This new second edition of Apache: The Definitive Guide fully describes Windows support and all the other Apache 1.3 features. Contents include:The history of the Apache Group Obtaining and compiling the server Configuring and running Apache on Unix and Windows, including such topics as directory structures, virtual hosts, and CGI programming The Apache 1.3 Module API Apache security A complete list of configuration directives With Apache: The Definitive Guide, web administrators new to Apache can get up to speed more quickly than ever before by working through the tutorial demo. Experienced administrators and CGI programmers, and web administrators moving from Unix to Windows, will find the reference sections indispensable. Apache: The Definitive Guide is the definitive documentation for the world's most popular web server. Includes CD-ROM with Apache manuals and demo sites discussed in the book.

Two Scoops of Django: Best Practices for Django 1.6


Daniel Roy Greenfeld - 2014
    

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Email Etiquette: Netiquette in the Information Age


David Tuffley - 2011
    While there have been attempts to establish one standard or another as the default, there is no common agreement. So beware people telling you there is one right way, they are assuming too much. As a general rule though, netiquette involves the same principles as plain old etiquette -- basic courtesy, respect and ethics. Treat people the way you would want to be treated yourself. By following the principles outlined below, the recipient of your email will be more likely to read and act, if not be favorably impressed by your message:Subject line to summarise the message. Make the Subject line summarise the body of the e-mail. Ask yourself, 'will the recipient(s) know what this e-mail is about'. For example, Instead of Subject: Exam, say Subject: Location of 1508INT Exam, 23 July 2011.Don't assume the recipient knows the background. Include enough contextual information at the beginning of the e-mail for the recipient to know what the matter is about. If in doubt, put background information in. For example, don't say can I have an extension for my assignment?, instead say I refer to the CIT3622 assignment 1 that I handed in late. I was ill and have a doctor's certificate. May I ask for an extension on the basis that I was too ill to do it on time?Keep it concise. Keep messages brief and to the point, but not so brief that it causes the problem outlined in the previous point. This includes deleting any irrelevant text when an email has been back and forth several times. No-one wants to scroll down through pages of text in order to reach the message they want to read. If the sense of the email will be lost by deleting that text, however, leave it in.Reply within 24 hours. Try to reply within 24 hours, less if possible. In fact, get in the habit of replying immediately -- it is the polite thing to do, and the recipient will appreciate a prompt reply. It also makes you look efficient. The longer you leave it to reply, the more likely you will forget or have too big a log-jam of unanswered email.Allow time for a reply. E-mail messages are not usually required to be answered immediately, though it is good practice if you do. Before sending a reminder, allow some time for a response, some times even a few days. Not everyone is online 24 hours a day.Use the BCC field when sending bulk email. If you're sending email to a whole list of people, put their email addresses in the BCC field. That way, the privacy of the recipient is respected, and spammers cannot harvest the email addresses for their dastardly purposes.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

My Kindle Fire (My...)


Jim Cheshire - 2011
    With this book you will learn how to tap into every Kindle Fire feature, including many of the hidden ones not discussed in other books. From setting up your Kindle Page, managing your music, watching movies, and downloading content - this book covers everything. The task based full-color format allows you to quickly and easily find the exact task you want to accomplish and walks you through it in a delightfully concise and visual manner. My Kindle Fire makes it easy for you to:• Master all the basics, fast: reading, playing, watching, browsing, and more• Tweak your Kindle Fire for quicker access and longer battery life• Sample best-seller book chapters for free• Mark up any eBook with highlights, notes, and bookmarks• Convert your personal documents for use on Kindle Fire• Discover Calibre, a powerful eBook management tool• Control even the largest music libraries• Get instant answers from Wikipedia, and from Kindle Fire’s built-in dictionary• Listen to personalized Internet radio stations created just for you• Use your Kindle Fire as a digital photo frame• Prevent unwanted subscription charges• Set up any email account to work on your Kindle Fire• Explore any web content with Amazon’s innovative Silk browser• Use Amazon Cloud to get your stuff anywhere—even if you left your Kindle at home• And much much more…Unlike many other guides which might only briefly mention or skip over some very import Kindle Fire features My Kindle Fire covers everything. Here are just a few of the things you'll find in My Kindle Fire that aren't covered in other guides: • Full coverage of Calibre, a free application for Mac or PC that helps manage your eBook library• A large number of walkthroughs for managing music playlists, including how to use cloud playlists. • How to reinstall multiple apps at once in case you reset your Kindle Fire. • Step-by-step walkthroughs on configuring all types of email accounts. • Coverage on handling attachments in your email application. • Importing contacts from your existing email application or cloud service and how you can export your contacts in order to back them up. • How to use Copy and Paste on the Kindle Fire. • How to use social networking integration with Facebook and others. • Walkthroughs on using the Gallery app, Pandora, Audible, and other popular apps. • Shows you how to access files on other computers in your house right from your Kindle Fire.