Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Computer Networks


Andrew S. Tanenbaum - 1981
    In this revision, the author takes a structured approach to explaining how networks function.

SQL (Visual QuickStart Guide)


Chris Fehily - 2002
    With SQL and this task-based guide to it, you can do it too—no programming experience required!After going over the relational database model and SQL syntax in the first few chapters, veteran author Chris Fehily launches into the tasks that will get you comfortable with SQL fast. In addition to explaining SQL basics, this updated reference covers the ANSI SQL:2003 standard and contains a wealth of brand-new information, including a new chapter on set operations and common tasks, well-placed optimization tips to make your queries run fast, sidebars on advanced topics, and added IBM DB2 coverage.Best of all, the book's examples were tested on the latest versions of Microsoft Access, Microsoft SQL Server, Oracle, IBM DB2, MySQL, and PostgreSQL. On the companion Web site, you can download the SQL scripts and sample database for all these systems and put your knowledge to work immediately on a real database..

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Computer Networking: A Top-Down Approach


James F. Kurose - 2000
    Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.

Essential English for Foreign Students, Book II, Students' Book


C.E. Eckersley - 1940
    It is planned to give a solid basis of the structures and vocabulary of English. Each book contains material for about a year's work, the vocabulary rising to some 3,000 words.The Teacher's Books provide notes on each lesson, the vocabulary to be taught, supplementary grammatical material and answers to exercises.In this new edition some of the grammatical sections have been, rewritten and expanded, and parts of the text and many illustrations have been brought up to date. Fundamentally, however, the new edition remains the same as previous editions.

Summary and Analysis of The Handmaid's Tale: Based on the Book by Margaret Atwood (Smart Summaries)


Worth Books - 2017
    Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader.    This short summary and analysis of The Handmaid’s Tale by Margaret Atwood includes:   Historical context Part-by-part summaries Analysis of the main characters Themes and symbols Important quotes Fascinating trivia Glossary of terms Supporting material to enhance your understanding of the original work   About Margaret Atwood’s The Handmaid’s Tale:   Margaret Atwood’s dystopian literary masterpiece tells the story of Offred, a Handmaid living in the near future in what was once the United States. A new theocratic regime called the Republic of Gilead has come to power and changed life as she knew it.   Once Offred had a her own name and a loving family—a husband and daughter—both of which were taken from her; now she belongs to the Commander and his hostile wife, and her only value lies in her ability to bear a child for them. She used to read books and learn; now such things are forbidden to all women.   Gripping, disturbing, and so relevant today, The Handmaid’s Tale is a brilliant novel and a chilling warning about what can happen when extreme ideas are taken to their logical conclusions.   The summary and analysis in this ebook are intended to complement your reading experience and bring you closer to a great work of fiction.

Medical-Surgical Nursing: Patient-Centered Collaborative Care, Single Volume


Donna D. Ignatavicius - 2009
    Ignatavicius and M. Linda Workman cover all the latest trends, evidence-based treatment guidelines, and additional updated information needed for safe clinical practice in medical-surgical nursing. This seventh edition features an expanded emphasis on patient safety and NCLEX? Examination preparation, new ties to the QSEN priorities for patient safety, and a greater alignment with the language and focus of clinical practice. A new chapter on evidence-based practice and a wealth of effective online learning tools help solidify your mastery of medical-surgical nursing.

The Edge of Disaster: Rebuilding a Resilient Nation


Stephen Flynn - 2007
    We have learned little from the cataclysms of September 11 and Hurricane Katrina. When it comes to catastrophe, America is living on borrowed time-and squandering it. In this new book, leading security expert Stephen Flynn issues a call to action, demanding that we wake up and prepare immediately for a safer future. The truth is acts of terror cannot always be prevented, and nature continues to show its fury in frighteningly unpredictable ways. Resiliency, argues Flynn, must now become our national motto. With chilling frankness and clarity, Flynn paints an all too real scenario of the threats we face within our own borders. A terrorist attack on a tanker carrying liquefied natural gas into Boston Harbor could kill thousands and leave millions more of New Englanders without power or heat. The destruction of a ship with a cargo of oil in Long Beach, California, could bring the West Coast economy to its knees and endanger the surrounding population. But even these all-too-plausible terrorist scenarios pale in comparison to the potential destruction wrought by a major earthquake or hurricane. Our growing exposure to man-made and natural perils is largely rooted in our own negligence, as we take for granted the infrastructure handed down to us by earlier generations. Once the envy of the world, this infrastructure is now crumbling. After decades of neglect, our public health system leaves us at the mercy of microbes that could kill millions in the next flu pandemic. Flash flooding could wipe out a fifty-year-old dam north of Phoenix, placing thousands of homes and lives at risk. The next San Francisco earthquake could destroy century-old levees, contaminating the freshwater supply that most of California relies on for survival. It doesn't have to be this way. "The Edge of Disaster "tells us what we can do about it, as individuals and as a society. We can-and, Flynn argues, we must-construct a more resilient nation. With the wounds of recent national tragedies still unhealed, the time to act is now. Flynn argues that by tackling head-on, eyes open the perils that lie before us, we can remain true to our most important and endearing national trait: our sense of optimism about the future and our conviction that we can change it for the better for ourselves-and our children. "Steve Flynn offers the answer not only to protecting America from terrorist attacks and natural disaster but also to revitalizing our democracy. This book is a must-read for all members of Congress, 2008 presidential candidates, and ordinary citizens who want to build a better and safer future."-Anne-Marie Slaughter, dean, Woodrow Wilson School of Public and International Affairs, Princeton University Advance praise for "The Edge of Disaster" "Steve Flynn has done it again. Like America the Vulnerable before it, "The Edge of Disaster" is the must-read book for every American, elected official, and presidential candidate who is committed to ensuring that our nation continue to thrive in perilous times."-Mark Warner, former governor of Virginia "Since 9/11, protecting our nation against a terrorist attack has consumed policy makers in Washington. What Stephen Flynn points out in The Edge of Disaster is that much of this effort has been directed overseas, often at the expense of our homeland and its much more likely areas of vulnerability. Laying out a series of potential disasters both manmade and natural, Flynn calls for a greater emphasis on preparedness and the ability of communities and the nation to recover. Painting an often frustrating and infuriating picture of missed opportunities, "The Edge of Disaster "is a call to action. The time to act is now. We can only hope that policy makers are listening." -Christine Todd Whitman, former governor of New Jersey and former administrator, Environmental Protection Agency (2001-03) "Steve Flynn's book makes the very persuasive argument that national security preparedness is linked to natural disaster preparedness. By investing significantly in our critical infrastructure, in citizen preparedness, and most importantly in leadership, we can be better prepared for all hazards. A great book that I highly recommend." -James Lee Witt, former director, Federal Emergency Management Agency "Steve Flynn has become a relentless contributor to the dialogue on prioritizing the work of the post-9/11 security environment. "The Edge of Disaster" calls into question the neglect of domestic preparedness in favor of the Department of Defense-driven offensive in the global war on terrorism. The book offers provocative challenges to both our elected and our private-sector leaders, and both should read it thoroughly." -Admiral James M. Loy, former commandant, U.S. Coast Guard, and former deputy secretary of homeland security

Computational Complexity


Christos H. Papadimitriou - 1993
    It offers a comprehensive and accessible treatment of the theory of algorithms and complexity—the elegant body of concepts and methods developed by computer scientists over the past 30 years for studying the performance and limitations of computer algorithms. The book is self-contained in that it develops all necessary mathematical prerequisites from such diverse fields such as computability, logic, number theory and probability.

Narrative Inquiry: Experience and Story in Qualitative Research


D. Jean Clandinin - 1999
    Clandinin and Connelly have created a major tour de force. This book is lucid, fluid, beautifully argued, and rich in examples. Students will find a wealth of arguments to support their research, and teaching faculty will find everything they need to teach narrative inquiry theory and methods.--Yvonna S. Lincoln, professor, Department of Educational Administration, Texas A&M University Understanding experience as lived and told stories--also known as narrative inquiry--has gained popularity and credence in qualitative research. Unlike more traditional methods, narrative inquiry successfully captures personal and human dimensions that cannot be quantified into dry facts and numerical data. In this definitive guide, Jean Clandinin and Michael Connelly draw from more than twenty years of field experience to show how narrative inquiry can be used in educational and social science research. Tracing the origins of narrative inquiry in the social sciences, they offer new and practical ideas for conducting fieldwork, composing field notes, and conveying research results. Throughout the book, stories and examples reveal a wide range of narrative methods. Engaging and easy to read, Narrative Inquiry is a practical resource from experts who have long pioneered the use of narrative in qualitative research.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Building Java Programs: A Back to Basics Approach


Stuart Reges - 2007
    By using objects early to solve interesting problems and defining objects later in the course, Building Java Programs develops programming knowledge for a broad audience. Introduction to Java Programming, Primitive Data and Definite Loops, Introduction to Parameters and Objects, Conditional Execution, Program Logic and Indefinite Loops, File Processing, Arrays, Defining Classes, Inheritance and Interfaces, ArrayLists, Java Collections Framework, Recursion, Searching and Sorting, Graphical User Interfaces. For all readers interested in introductory programming.

Money & Capital Markets


Peter S. Rose - 1989
    This book discuses various major types of financial institutions and financial instruments present along with how and why the system of money and capital markets is changing. It also provides a descriptive explanation of how interest rates and security values are determined.