The Really Short Poems


A.R. Ammons - 1991
    . . . Ammons makes you laugh and forces you to think hard about the way humans relate to natural phenomena and to themselves. From such simple, short expression emerge complex, often confounding ideas. New readers of poetry as well as those with an active interest in lyric verse will love this volume.”—Booklist

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Decision Support Systems and Intelligent Systems


Efraim Turban - 1998
    

Guide to Computer Forensics and Investigations (Book & CD)


Bill Nelson - 2003
    This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. It is appropriate for students new to the field, or as a refresher and technology update for professionals in law enforcement, investigations, or computer security. The book features free downloads of the latest forensic software, so readers can become familiar with the tools of the trade.

Amazon Simple Storage Service (S3) Getting Started Guide


Amazon Web Services - 2012
    This guide introduces the basic concepts of Amazon S3, the bucket and the object. It walks you through the process of using the AWS Management Console, a browser-based graphical user interface, to create a bucket and then upload, view, move, and delete an object.

Aquaponics Gardening A Step-By-Step Guide to Raising Vegetables and Fish


Sylvia Berstein - 2010
    The content is well sourced and there are plenty of references in the appendices.

The Bottled Leopard


Vincent Chukwuemeka Ike
    

Absolute Java


Walter J. Savitch - 2003
    Praised for providing an engaging balance of thoughtful examples and explanatory discussion, ?best-selling author Walter Savitch explains concepts and techniques in a straightforward style using understandable language and code enhanced by a suite of pedagogical tools.? "Absolute Java "is appropriate for both introductory and intermediate programming courses introducing Java.

Our Man in Orlando


Hugh Hunter - 2010
    Many of these stories never made it back home - until now.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Management of Business for Cape(r) Unit 1


Peter Stimpson - 2007
    This new textbook has been developed to match the requirements of the CAPE Management of Business syllabus. Full coverage of the CAPE syllabus is provided and the content has a clear focus on the Caribbean economic and business environment. A distinctive feature is the provision of examination-type questions at the end of each major section. The questions come with suggested time limite for answering, giving useful practice in how to allocate time for the final examination. Management of Business for CAPE includes case studies from a variety of countries and industries, as well as an internal assessment component.

The Adventures of Huckleberry Finn (Macmillan Reader)


F.H. Cornish - 2007
    The classic story of a boy's adventures in the Mississippi Valley.

MATLAB: An Introduction with Applications


Amos Gilat - 2003
    The first chapter describes basic features of the program and shows how to use it in simple arithmetic operations with scalars. The next two chapters focus on the topic of arrays (the basis of MATLAB), while the remaining text covers a wide range of other applications. Computer screens, tutorials, samples, and homework questions in math, science, and engineering, provide the student with the practical hands-on experience needed for total proficiency.

Advanced Apex Programming for Salesforce.com and Force.com


Dan Appleman - 2012
    Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.