Book picks similar to
Java: Practical Guide for Programmers by Michael Sikora


programming
technical-manuals
work
information-technology

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Architecting for the AWS Cloud: Best Practices (AWS Whitepaper)


Amazon We Services - 2016
    It discusses cloud concepts and highlights various design patterns and best practices. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

Manly Crafts


Instructables.com - 2011
    Learn how to make a 5-cent wedding band, leather iPod case, and paracord bullwhip!

Visual C++ Programming


Yashavant P. Kanetkar - 2004
    

Prince2 for Dummies


Nick Graham - 2008
    Fully updated with the 2009 practice guidelines, this book will take you through every step of a project - from planning and establishing roles to closing and reviewing - offering practical and easy-to-understand advice on using PRINCE2. It also shows how to use the method when approaching the key concerns of project management, including setting up effective controls, managing project risk, managing quality and controlling change. PRINCE2 allows you to divide your project into manageable chunks, so you can make realistic plans and know when resources will be needed. PRINCE2 For Dummies, 2009 Edition provides you with a comprehensive guide to its systems, procedures and language so you can run efficient and successful projects.PRINCE2 For Dummies, 2009 Edition includes: Part I: How PRINCE Can Help You - Chapter 1: So What's a Project Method and Why Do I Need to Use One? - Chapter 2: Outlining the Structure of PRINCE2 - Chapter 3: Getting Real Power from PRINCE2Part II: Working Through Your Project - Chapter 4: Checking the Idea Before You Start - Chapter 5: Planning the Whole Project: Initiation - Chapter 6: Preparing for a Stage in the Project - Chapter 7: Controlling a Stage - Chapter 8: Building the Deliverables - the Work of the Teams - Chapter 9: Finishing the Project - Chapter 10: Running Effective Project BoardsPart III: Help with PRINCE Project Management - Chapter 11: Producing and Updating the Business Case - Chapter 12: Deciding Roles and Responsibilities - Chapter 13: Managing Project Quality - Chapter 14: Planning the Project, Stages, and Work Packages - Chapter 15: Managing Project Risk - Chapter 16: Controlling Change and Controlling Versions - Chapter 17: Monitoring Progress and Setting Up Effective ControlsPart IV: The Part of Tens - Chapter 18: Ten Ways to Make PRINCE Work Well - Chapter 19: Ten Tips for a Good Business Case - Chapter 20: Ten Things for Successful Project Assurance Part V: Appendices - Appendix A: Looking into PRINCE Qualifications - Appendix B: Glossary of the Main PRINCE2 Terms

Overview of Amazon Web Services (AWS Whitepaper)


Amazon Web Services - 2016
    From data warehousing to deployment tools, directories to content delivery, over 175 AWS services are available. New services can be provisioned quickly, without the upfront capital expense. This allows enterprises, start-ups, small and medium-sized businesses, and customers in the public sector to access the building blocks they need to respond quickly to changing business requirements. This whitepaper provides you with an overview of the benefits of the AWS Cloud and introduces you to the services that make up the platform.

25 Real Estate Lead Generating Strategies That Work


Greg Reed - 2014
    Well ‘next’ might be exaggerating it a little. A sale would be more appropriate. Each night I’d return home and let out a bunch of expletives that would make my dog blush. I was often in a foul mood. Then after 10 years of struggle I discovered, developed and implemented a bunch of real estate marketing strategies which I am going reveal in this book that saw my income virtually double in one year. After 2 years of using these real estate lead generation skills my income shot up another 50%. The word soon got out that I had discovered a way to make ‘easy’ (no such thing) real estate sales. Real estate referrals became my method of operation. Companies were approaching me to move camps. In fact one company placed me on a $200,000 package to help boost sales. The strategies worked for me and they’ll work for you. This book is for real estate sales people, real estate agents or brokers who are totally overwhelmed with the complexities of selling real estate. It’s for agents seething with frustration at their pathetic sales. And it’s also for successful real estate agents wanting to take their real estate career to the next level. You have two obstacles from making a killing in real estate sales: 1. You have no idea what business you are REALLY in. Most real estate sales people think that they are in the real estate business to assist people with their real estate buying, selling, leasing or managing needs.While partly ‘true’ unless you have a real estate lead that wants to buy, sell, lease or manage a property through you, you have no business. PERIOD. 2. A belief that you are ‘Gods’ answer to all things real estate.Let’s face it. Real estate agents are an egotistical bunch. How often do you see advertisements stating “Billy Blogs – No. 1 For XYZ Real Estate” or “Cheryl Champion – Top Real Estate Marketer, Mars Tribune” Who gives a toss. The public certainly don’t and nor should you especially if you are a newbie just getting started. With my real estate lead generation tips you’ll soon be the ‘king’ or queen’ of your local area. My real estate lead generation strategies are by no means complete. But they are a good start in raising you from the depths of despair to making you the champion agent you so rightly deserve to be. Here’s my appeal to you. Believe in yourself. Believe in your real estate career. Follow my suggestions. Implement those that appeal to you and be consistent. These real estate lead generation strategies take time but they have helped me sell over $400 million of real estate. They will work for you to.

Prince2 Study Guide


David Hinde - 2012
    Everything you need to be fully prepared to take the PRINCE2Foundation and Practitioner examAs an internationally recognized certification which focuses onthe Foundation and Practitioner levels along with being recommendedby the Project Management Institute, the PRINCE2 accreditationgives a bolster to any resume.The author, David Hinde, has trained hundreds of individualsfrom many different backgrounds to prepare for the PRINCE2 exams.The book provides explanations of all parts of the PRINCE2approach, lots of practical examples, and a whole range of mockexamination questions to test your knowledge.Explains all the PRINCE2 themes, processes, principles, rolesand management products for the very latest version of PRINCE2(PRINCE2 2009 Edition)Features full coverage of all Foundation and Practitioner levelexam objectivesPresents real-world scenarios, showing how the method isused in business and the public sectorIncludes challenging review questions and electronic flashcardsto sharpen your knowledgeCovers tips and techniques for tackling the PRINCE2accreditation examinations and shows you how and where to take theexamsIncorporates over 300 sample Foundation-level and over 100sample Practitioner-level questions, with answers and fullexplanationsContains a glossary of all PRINCE2 terminology and a quickreference to all the PRINCE2 management productsGives a web link to a set of on-line tools with more bonusexamsPRINCE2 Study Guide covers all the necessary topics youneed to know in order to confidently take the PRINCE2 Foundationand Practitioner exams.

The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence


Ralph Kimball - 2010
    Recognized and respected throughout the world as the most influential leaders in the data warehousing industry, Ralph Kimball and the Kimball Group have written articles covering more than 250 topics that define the field of data warehousing. For the first time, the Kimball Group's incomparable advice, design tips, and best practices have been gathered in this remarkable collection of articles, which spans a decade of data warehousing innovation.Each group of articles is introduced with original commentaries that explain their role in the overall lifecycle methodology developed by the Kimball Group. These practical, hands-on articles are fully updated to reflect current practices and terminology and cover the complete lifecycle--including project planning, requirements gathering, dimensional modeling, ETL, and business intelligence and analytics.This easily referenced collection is nothing less than vital if you are involved with data warehousing or business intelligence in any capacity.

Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking)


Andrew McKinnon - 2015
    It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Denial of Service or DoS Spoofing Techniques Mobile Hacking Hacking Tools Penetration Testing Passive Attacks If you are looking to venture into the world of hacking, this book will teach you all the information you need to know. When you download Hacking: Ultimate Hacking For Beginners - How to Hack, you'll discover how to acquire Many Powerful Hacking Tools. You'll also learn about Malware: A Hacker’s Henchman and Common Attacks And Viruses. You'll even learn about identity theft, how to protect yourself, and how hackers profit from this information! Read this book for FREE on Kindle Unlimited - Download NOW! Download Hacking: Ultimate Hacking For Beginners - How to Hack right away - This Amazing 4th Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, mobile hacking, and tips for ethical hacking. You'll even learn how to fight viruses and choose the right antivirus software for your system! Just scroll to the top of the page and select the Buy Button. Download Your Copy TODAY!

The Adsense Code: What Google Never Told You about Making Money with Adsense


Joel Comm - 2005
    For those who know the secret, the result is untold wealth. Each month, a small group of people - an elite club who have uncovered the mysteries of The AdSense Code- put their knowledge to use and receive checks for tens of thousands of dollars from Google. And untold numbers of additional site owners are regularly generating supplemental income via AdSense while they play, sleep and eat. The AdSense Code is concise and very focused on the objective of revealing the proven online strategies to creating passive income with Google AdSense. The AdSense Code reveals hands-on solutions to many of the concerns and challenges faced by content publishers in their quest to attract targeted traffic, improve content relevance and increase responsiveness to AdSense ads - using easy and legitimate techniques that have worked for those who know the secrets. Google AdSense expert, Joel Comm, provides you with the keys you need to ""crack"" The AdSense Code and unlock the secrets to making money online.

Cryptography and Network Security


Behrouz A. Forouzan - 2007
    In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.

Laravel: Code Bright


Dayle Rees - 2013
    At $29 and cheaper than a good pizza, you will get the book in its current partial form, along with all future chapters, updates, and fixes for free. As of the day I wrote this description, Code Bright had 130 pages and was just getting started. To give you some perspective on how detailed it is, Code Happy was 127 pages in its complete state. Want to know more? Carry on reading.Welcome back to Laravel. Last year I wrote a book about the Laravel PHP framework. It started as a collection of tutorials on my blog, and eventually became a full book. I definitely didn’t expect it to be as popular as it was. Code Happy has sold almost 3000 copies, and is considered to be one of the most valuable resourcesfor learning the Laravel framework.Code Bright is the spiritual successor to Code Happy. The framework has grown a lot in the past year, and has changed enough to merit a new title. With Code Bright I hope to improve on Code Happy with every way, my goal is, to once again, build the most comprehensive learning experience for the framework. Oh, and to still be funny. That’s very important to me.Laravel Code Bright will contain a complete learning experience for all of the framework’s features. The style of writing will make it approachable for beginners, and a wonderful reference resource for experienced developers alike.You see, people have told me that they enjoyed reading Code Happy, not only for its educational content, but for its humour, and for my down to earth writing style. This is very important to me. I like to write my books as if we were having a conversation in a bar.When I wrote Code Happy last year, I was simply a framework enthusiast. One of the first to share information about the framework. However, since then I have become a committed member of the core development team. Working directly with the framework author to make Laravel a wonderful experience for the developers of the world.One other important feature of both books, is that they are published while in progress. This means that the book is available in an incomplete state, but will grow over time into a complete title. All future updates will be provided for free.What this means is that I don’t have to worry about deadlines, or a fixed point of completion. It leads to less stress and better writing. If I think of a better way to explain something, I can go back and change it. In a sense, the book will never be completed. I can constantly add more information to it, until it becomes the perfect resource.Given that this time I am using the majority of my spare time to write the title (yes, I have a full time job too!), I have raised the price a little to justify my invested time. I was told by many of my past readers that they found the previous title very cheap for the resource that it grew into, so if you are worried about the new price, then let me remind you what you will get for your 29 bucks.The successor to Code Happy, seen by many as the #1 learning resource for the Laravel PHP framework.An unending source of information, chapters will be constantly added as needed until the book becomes a giant vault of framework knowledge.Comedy, and a little cheesy, but very friendly writing.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

The Anatomy of the Swipe: Making Money Move


Ahmed Siddiqui - 2020
    Yet, not many people understand how payment systems in the US work. Those that do "get it" are unlocking multi-billion dollar opportunities. If you've ever wondered what happens when you actually swipe/dip/tap your credit card or debit card then The Anatomy of the Swipe breaks down the details in the simplest manner possible. Here are some questions answered within these pages:How does money move from my credit card to my favorite coffee shop? How can I build a neo-bank? How can I build my own debit or credit card? How can I accept card based payments? The Anatomy of the Swipe speaks to software developers and entrepreneurs who are looking at implementing card-based payments for the first time, merchants who want to be able to accept payments for a website or store, or those who want to issue their own debit/credit card. This book walks beginners through modern innovations created because of card-based payments, as well as the motivations and revenue models of each party in the payments ecosystem.