Book picks similar to
PHP Ajax Cookbook by Milan Sedliak


ios_osx_android_e<br/>tc_dev
packt_free_ebooks
programming
tech-books

The Defenders and Three Others


Philip K. Dick - 1950
    Dick! Here are "The Defenders," in which mankind has taken refuge beneath the Earth's surface, leaving all-out war to robots ... "Beyond Lies the Wub," in which a highly philosophical Martian creature finds itself on the wrong end of the dinner table ... "The Crystal Crypt," in which the last Terran ship from Mars finds terrorists aboard ... and "Beyond the Door," a most unusual story in which an abusive husband ends up with more than he bargains for!

Jeffrey Dahmer: The Gruesome True Story of a Hungry Cannibalistic Rapist and Necrophiliac Serial Killer (Real Crime by Real Killers Book 3)


Ryan Becker - 2017
    Necrophiliac. Kidnapper. Killer.The stories of serial killers often begin with terrible upbringings and sad events of trauma, but not all have such unfortunate beginnings. Some simply develop their evil on their own and become tainted without anyone realizing it.Jeffrey Dahmer was a man described by his own father as the result of a child becoming lost in the maelstrom while nobody paid attention, of a child who was strange and apathetic but who nobody bothered to ask why......The results were catastrophic.Seventeen men lost their lives and were defiled even after death because of the desires of a neglected young boy who just wanted to fulfill his needs. The following is the tale of said child, the same young man who grew up to become the infamous Milwaukee Cannibal, one of the worst serial killers in humanity's history.Jeffrey Dahmer: The Gruesome True Story of a Hungry Cannibalistic Rapist and Necrophiliac Serial Killer (Vol 3) is a book that recounts the tale of the Milwaukee Cannibal, a man capable of committing the most truly degrading acts on his victims before and even after death; a man who to his last days - and long after - still haunts the city of Milwaukee with the memories of his horrific murders.Be warned, reader, you aren't just about to read about Jeffrey Dahmer and his acts.You are about to walk into his very mind.

Programming Entity Framework: Code First


Julia Lerman - 2011
    With this concise book, you’ll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration.Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you’re working with an existing database or building one from scratch. If you work with Visual Studio and understand database management basics, this book is for you.Learn exactly what Code First does—and does not—enable you to doUnderstand how property attributes, relationships, and database mappings are inferred from your classes by Code FirstUse Data Annotations and the Fluent API to configure the Code First data modelPerform advanced techniques, such as controlling the database schema and overriding the default model cachingThis book is a continuation of author Julia Lerman’s Programming Entity Framework, widely recognized as the leading book on the topic.

Building Java Programs: A Back to Basics Approach


Stuart Reges - 2007
    By using objects early to solve interesting problems and defining objects later in the course, Building Java Programs develops programming knowledge for a broad audience. Introduction to Java Programming, Primitive Data and Definite Loops, Introduction to Parameters and Objects, Conditional Execution, Program Logic and Indefinite Loops, File Processing, Arrays, Defining Classes, Inheritance and Interfaces, ArrayLists, Java Collections Framework, Recursion, Searching and Sorting, Graphical User Interfaces. For all readers interested in introductory programming.

CSS and Documents


Eric A. Meyer - 2012
    

Twenty Years Before the Mast


Charles Erskine - 1888
     He would go on to travel to some of the most unexplored regions, meeting men and women who had never seen westerners before. Along the journey the crew meet Patagonians, Fijians, Tahitians, Aborigines, and many other peoples. Although the Wilkes expedition was largely scientific mission, the ships were not always peaceful, indeed there were a number of armed conflicts with Pacific Islanders as the United States began to assert its authority across the globe. The ships and their crews had to withstand some of the most appalling conditions as they continued their expedition, from the heat-driven mirages of the South Atlantic to the brutal cold of the Antarctic seas. What makes Erskine’s narrative so remarkable is that he is not writing from the perspective of an admiral or a scientific explorer, but instead from the viewpoint of a common sailor. Interspersed throughout the narrative are short ditties and sailor’s songs that provide a vivid picture of the mentality of nineteenth century seamen. After the Wilkes expedition landed back in the United States Erskine spent only brief moments on dry land as he frequently registered under new ships and continued his journeys. Erskine’s book is a fascinating first-hand account of exploration and maritime life aboard a tall ship. Twenty Years Before the Mast was published in 1896 towards the end of Erskine’s life.

Groovy in Action


Dierk König - 2007
    Groovy in Action is a comprehensive guide to Groovy programming, introducing Java developers to the new dynamic features that Groovy provides. To bring you Groovy in Action, Manning again went to the source by working with a team of expert authors including both members and the Manager of the Groovy Project team. The result is the true definitive guide to the new Groovy language.Groovy in Action introduces Groovy by example, presenting lots of reusable code while explaining the underlying concepts. Java developers new to Groovy find a smooth transition into the dynamic programming world. Groovy experts gain a solid reference that challenges them to explore Groovy deeply and creatively.Because Groovy is so new, most readers will be learning it from scratch. Groovy in Action quickly moves through the Groovy basics, including:Simple and collective Groovy data types Working with Closures and Groovy Control Structures Dynamic Object Orientation, Groovy styleReaders are presented with rich and detailed examples illustrating Groovy's enhancements to Java, includingHow to Work with Builders and the GDK Database programming with GroovyGroovy in Action then demonstrates how to Integrate Groovy with XML, and provides:Tips and Tricks Unit Testing and Build Support Groovy on WindowsAn additional bonus is a chapter dedicated to Grails, the Groovy Web Application Framework.Purchase of the print book comes with an offer of a free PDF eBook from Manning. Also available is all code from the book.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions


Johnny Cache - 2007
    Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.

Prince2 for Dummies


Nick Graham - 2008
    Fully updated with the 2009 practice guidelines, this book will take you through every step of a project - from planning and establishing roles to closing and reviewing - offering practical and easy-to-understand advice on using PRINCE2. It also shows how to use the method when approaching the key concerns of project management, including setting up effective controls, managing project risk, managing quality and controlling change. PRINCE2 allows you to divide your project into manageable chunks, so you can make realistic plans and know when resources will be needed. PRINCE2 For Dummies, 2009 Edition provides you with a comprehensive guide to its systems, procedures and language so you can run efficient and successful projects.PRINCE2 For Dummies, 2009 Edition includes: Part I: How PRINCE Can Help You - Chapter 1: So What's a Project Method and Why Do I Need to Use One? - Chapter 2: Outlining the Structure of PRINCE2 - Chapter 3: Getting Real Power from PRINCE2Part II: Working Through Your Project - Chapter 4: Checking the Idea Before You Start - Chapter 5: Planning the Whole Project: Initiation - Chapter 6: Preparing for a Stage in the Project - Chapter 7: Controlling a Stage - Chapter 8: Building the Deliverables - the Work of the Teams - Chapter 9: Finishing the Project - Chapter 10: Running Effective Project BoardsPart III: Help with PRINCE Project Management - Chapter 11: Producing and Updating the Business Case - Chapter 12: Deciding Roles and Responsibilities - Chapter 13: Managing Project Quality - Chapter 14: Planning the Project, Stages, and Work Packages - Chapter 15: Managing Project Risk - Chapter 16: Controlling Change and Controlling Versions - Chapter 17: Monitoring Progress and Setting Up Effective ControlsPart IV: The Part of Tens - Chapter 18: Ten Ways to Make PRINCE Work Well - Chapter 19: Ten Tips for a Good Business Case - Chapter 20: Ten Things for Successful Project Assurance Part V: Appendices - Appendix A: Looking into PRINCE Qualifications - Appendix B: Glossary of the Main PRINCE2 Terms

Linux Server Hacks: 100 Industrial-Strength Tips and Tools


Rob Flickenger - 2003
    Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks.Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.

Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners


Chris Dannen - 2017
    Blockchain protocols are taking the world by storm, and the Ethereum project, with its Turing-complete scripting language Solidity, has rapidly become a front-runner. This book presents the blockchain phenomenon in context; then situates Ethereum in a world pioneered by Bitcoin.See why professionals and non-professionals alike are honing their skills in smart contract patterns and distributed application development. You'll review the fundamentals of programming and networking, alongside its introduction to the new discipline of crypto-economics. You'll then deploy smart contracts of your own, and learn how they can serve as a back-end for JavaScript and HTML applications on the Web.Many Solidity tutorials out there today have the same flaw: they are written for "advanced" JavaScript developers who want to transfer their skills to a blockchain environment. Introducing Ethereum and Solidity is accessible to technology professionals and enthusiasts of all levels. You'll find exciting sample code that can move forward real world assets in both the academic and the corporate arenas. Find out now why this book is a powerful gateway for creative technologists of all types, from concept to deployment.What You'll LearnSee how Ethereum (and other cryptocurrencies) workCompare distributed apps (dapps) to web appsWrite Ethereum smart contracts in Solidity Connect Ethereum smart contracts to your HTML/CSS/JavaScript web applicationsDeploy your own dapp, coin, and blockchainWork with basic and intermediate smart contractsWho This Book Is For Anyone who is curious about Ethereum or has some familiarity with computer science Product managers, CTOs, and experienced JavaScript programmersExperts will find the advanced sample projects in this book rewarding because of the power of Solidity

SEO Search Engine Optimization Bible


Jerri L. Ledford - 2005
    This in-depth Bible delivers the holy grail of online marketing: how to influence search engine results to drive online shoppers to specific Web sites; the process is called search engine optimization (SEO) and it is a hot topic One-stop resource offers readers what they need to plan and implement a successful SEO program, including useful tips on finding the shortest routes to success, strategy suggestions, and sidebars with more information and additional resources Features interviews with executives from top search companies, plus appendices on creating successful listings with Google, MSN, Yahoo!, and others Topics include creating an SEO plan; managing keywords; maximizing pay-per-click strategies; understanding the role of links and linking; robots, spiders, and crawlers; maintaining SEO; analyzing success rates; and much more

Coyote Breed


Alan David - 2016
    Praise for Alan David 'A classic of the genre.' – Tom Kasey, bestselling author of Trade Off.Alan David is a prolific writer of over 500 novels in a wide range of genres, from classic westerns, to historical thrillers. His other western novels include Fight or Die, Gun Hell, Gun Wages, Wildmen and Draw or Die. Pioneering Press is an imprint of Endeavour Press, the UK’s leading independent digital publisher. We publish new and classic westerns by authors from the US and the UK. Sign up to our newsletterFollow us on Twitter: @PioneeringPress

Logic and Computer Design Fundamentals


M. Morris Mano - 1900
    Morris Mano, Charles R. Kime - Prentice Hall (2007) - Hardback - 678 pages - ISBN 013198926XFeaturing a strong emphasis on the fundamentals underlying contemporary logic design using hardware description languages, synthesis, and verification, this book focuses on the ever-evolving applications of basic computer design concepts with strong connections to real-world technology.Treatment of logic design, digital system design, and computer design.Ideal for self-study by engineers and computer scientists.

Swift Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides)


Matthew Mathias - 2015
    Throughout the book, the authors share their insights into Swift to ensure that you understand the hows and whys of Swift and can put that understanding to use in different contexts. After working through the book, you will have the knowledge and confidence to develop your own solutions to a wide range of programming challenges using Swift.