Night Zero


Rob Horner - 2019
    The theory is sound, but something goes wrong, and a highly contagious combination of virus and prion is unleashed, a middle-stage organism too dangerous to test. With emergency services overwhelmed, a small community hospital tries to combat the unthinkable--an illness that causes aggression, spreads through violence, and won’t allow the dead to rest.

CISM Review Manual 2015


ISACA - 2005
    

Hit Down Dammit! (The Key to the Golf)


Clive Scarff - 2010
    Surprisingly, a great many players surveyed did not even know you need to hit down to get the ball up in the air. Hit Down @#!*% ! concisely explains the concept - and the technique - of hitting down at the golf ball for proper trajectory, increased backspin, much improved distance, proper divot taking, and best of all: consistent shotmaking.If you are inadvertently - or intentionally - hitting up at the ball, Hit Down @#!*% ! is for you. (Also available as DVD series, and MP3 download, all on Amazon.)If you are a seasoned amateur who has inexplicably “plateaud” - just cannot seem to get to the next level despite lessons and/or acquiring a library of books and videos - Hit Down @#!*% ! is for you.Symptoms of hitting up include (but are not limited to): - topping the ball- skulling the ball- pushing the ball- slicing the ball- poor distance- difficulty getting off back foot- poor backspin- no divot- fat divots- chunking the ball- thin/fat chip shots- roofing the ball with your driver- inability to hit long irons and/or fairway woods- good shots followed immediately by poor shotsHitting down at the golf ball is not a new concept, but it is a hitherto poorly explained (or completely avoided) concept. All pros agree on the need to hit down, so there is no debate there. Even Tiger Woods, in his 306 page “How I Play Golf”, states the need to hit down at the ball – but does not explain how. Hit Down @#!*% ! does. Learn to hit down, watch the ball go up, and your scores go down. BONUS: At the end of this book you will find a link to purchase the Hit Down @#!*% ! 4 DVD series and receive a full credit for the purchase of this Kindle ebook.

The Best American Science Writing 2007


Gina Kolata - 2007
    Featuring the imprimatur of bestselling author and New York Times reporter Gina Kolata, one of the nation's foremost voices in science and medicine, and with contributions from Atul Gawande, Elizabeth Kolbert, and Oliver Sacks, among others, The Best American Science Writing 2007 is a compelling anthology of our most advanced, and most relevant, scientific inquiries.

Jumping into C++


Alex Allain - 2013
    As a professional C++ developer and former Harvard teaching fellow, I know what you need to know to be a great C++ programmer, and I know how to teach it, one step at a time. I know where people struggle, and why, and how to make it clear. I cover every step of the programming process, including:Getting the tools you need to program and how to use them*Basic language feature like variables, loops and functions*How to go from an idea to code*A clear, understandable explanation of pointers*Strings, file IO, arrays, references*Classes and advanced class design*C++-specific programming patterns*Object oriented programming*Data structures and the standard template library (STL)Key concepts are reinforced with quizzes and over 75 practice problems.

Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future: A 29-Minute Summary.


Bern Bolo - 2015
     This summary will let you taste on “how and what” Elon musk struggles to show his “SPARKS” in levels, Why his capable and legendary “like “ the famous Edison, Ford and Jobs. Based from the original book of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future, Ashlee Vance, tell you his experience in conversation with Musk. Important Lessons in this Elon Musk Summary • How to get the most out of people who work for you. • How to understand the value of making your own stuff, than buying them. • How to be brave in going out from your comfort zone. • How to treat challenges that comes your way as an opportunity. • How to believe in your dreams, and then make others believe after. • How to spot an opportunity when it comes your way. • How to keep yourself open to achieve bigger and greater things, and ultimately, your fullest potential. • How to dream big and then chase it. • How to give the value your family deserves. • How to appreciate the value of caring for Mother Earth and exercise ways to protect her and lessen the damage she has to take. • How to address issues and conflicts. • How to be persistent in your endeavors. More inside in this Biographies & Memoirs Summary • A brief yet accurate summary on the life of Elon Musk, detailed out in individual chapters. • Correct and concise synopsis of the various chapters of the book. • Silly and charming quotes that will tickle your fancy at the start of each chapters. • Personal and professional lessons from the life of Elon Musk on how to dare dream big and conquer your fears. Why you musy by this summary My team and I will let you sift through Elon’s captivating world in 29 minutes by reading this synopsis. “I like to be involved in things that change the world.” – Elon Reeve Musk. Surely, what Elon Musk had been doing in his companies have changed the world in so many ways. He has broken through the norm and boring routine practices to come up with technologies that has never before been seen by anyone. This summary show many things on how Elon Musk proved that he did changed the world. From his ancestors to his early life in Africa, to his great migrations, to the funding of his first start-up businesses and to his eventually discovery of his vision and mission in life, this book will satiate your curiosity as to who Musk really is and what he is capable of doing. PLEASE NOTE: This is a 29-minute summary of Elon Musk and NOT the original book. Bern Bolo "The Bathroom Genius”

Systems Analysis and Design


Alan Dennis - 2002
    Building on their experience as professional systems analysts and award-winning teachers, authors Dennis, Wixom, and Roth capture the experience of developing and analyzing systems in a way that students can understand and apply.With Systems Analysis and Design, 4th edition , students will leave the course with experience that is a rich foundation for further work as a systems analyst.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

The Evolution of Useful Things: How Everyday Artifacts-From Forks and Pins to Paper Clips and Zippers-Came to be as They are.


Henry Petroski - 1994
    How did the table fork acquire a fourth tine?  What advantage does the Phillips-head screw have over its single-grooved predecessor? Why does the paper clip look the way it does? What makes Scotch tape Scotch?   In this delightful book Henry Petroski takes a microscopic look at artifacts that most of us count on but rarely contemplate, including such icons of the everyday as pins, Post-its, and fast-food "clamshell" containers.  At the same time, he offers a convincing new theory of technological innovation as a response to the perceived failures of existing products—suggesting that irritation, and not necessity, is the mother of invention.

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"


Jeremy N. Smith - 2019
    When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.

Stories from the Emergency Department


Mary Beth Engrav - 2011
    Real stories about the patients, nurses, consulting physicians, and daily life of a busy Emergency Department. Get a glimpse inside the inner workings of an Emergency Department and the staff that works there, caring for patients and their families. From a toddler who can cuss a blue streak, a dead mouse brought into the Emergency Department, to critical resuscitations, these are stories that you will never forget.

Master of Electricity - Nikola Tesla: A Quick-Read Biography About the Life and Inventions of a Visionary Genius


Cynthia A. Parker - 2015
    Parker removes that pain by offering an opportunity to Get-to-Know the 'Master of Electricity,' to learn of his youth and upbringing, his early career, and of course his pivotal role in advancing the World into the Electrical Age! Turn these pages and enjoy the opportunity to learn history, but better yet to come to know Tesla better through Parker’s amazing ability to describe his life, his eccentricities and above all, his accomplishments; making this an enjoyable and interesting Quick-Read Biography. This Book also Comes with a FREE Gift!

SR-71: The Complete Illustrated History of the Blackbird, The World's Highest, Fastest Plane


Richard H. Graham - 2013
    Features over 200 incredible photos. Flying to a coffee table near you comes the new paperback edition of this authoritative and illustrated history of the most mind-bending military aircraft ever flown! Developed by the renowned Lockheed Skunk Works, the SR-71 was an awesome aircraft in every respect, setting world records for altitude and speed: an absolute altitude record of 85,069 feet on July 28, 1974, and an absolute speed record of 2,193.2 miles per hour on the same day.Written by a former Blackbird pilot, SR-71 covers every aspect of the aircraft's development, manufacture, and active service, all lavishly illustrated with more than 200 photos. The SR-71 remained in service with the U.S. Air Force from 1964 to 1998, when it was withdrawn from use, superseded by satellite technology. This authoritative history covers the spylane's entire phenomenal service.

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.