Book picks similar to
MCSE Core-Four Exam Cram Pack: Exams 70-058, 7-067, 70-068, 70-073 by Ed Tittel
audio_wanted
computers
donated
how-to
Projector for Sale
Steven Decker - 2021
While searching for a job, her lifelong interest in cinema is sparked by an ad about a projector for sale, and something happens that mysteriously changes everything.Emily not only starts remembering her dreams, she finds herself transforming them into reality, and her life inexplicably begins to blossom. She travels around the world searching for answers, encountering people and experiencing life-changing events that she's dreamed about before, forming relationships that could last a lifetime.But new, powerful dreams compel her to abandon the path she'd hoped to follow, and Emily must now face a final, frightening question. Can she determine her own destiny or will it be written by processes she simply cannot control?
Oz, the Complete Paperback Collection: The Wonderful Wizard of Oz; The Road to Oz; The Scarecrow of Oz; The Lost Princess of Oz; The Magic of Oz
L. Frank Baum - 2013
Complete collection volumes 1-5.Volume 1wizard of ozmarvelous land of ozozma of ozVolume 2dorothy and the wizard of ozthe road to ozthe emerald city of ozVolume 3patchwork girl of oztik-tok of ozthe scarecrow of ozVolume 4rinkitink of ozthe lost princess of ozthe tin woodman of ozVolume 5the magic of ozglinda of ozthe royal book of oz
Windows Sysinternals Administrator's Reference
Mark E. Russinovich - 2009
Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns
Build Your Own Database Driven Website Using PHP & MySQL
Kevin Yank - 2001
There has been a marked increase in the adoption of PHP, most notably in the beginning to intermediate levels. PHP now boasts over 30% of the server side scripting market (Source: php.weblogs.com).The previous edition sold over 17,000 copies exclusively through Sitepoint.com alone. With the release of PHP 5, SitePoint have updated this bestseller to reflect best practice web development using PHP 5 and MySQL 4.The 3rd Edition includes more code examples and also a new bonus chapter on structured PHP Programming which introduces techniques for organizing real world PHP applications to avoid code duplication and ensure code is manageable and maintainable. The chapter introduces features like include files, user-defined function libraries and constants, which are combined to produce a fully functional access control system suitable for use on any PHP Website.
The Belt: Complete Trilogy
Gerald M. Kilby - 2018
The ship contains an experimental quantum device, lost while en route to a research colony on Europa. On Earth, powerful corporate forces are moving to resume unrestricted, inter-AI communications, their objective being to gain complete dominion over the colonized solar system. But the outer worlds are mobilizing to prevent them from achieving their objective, a fight back which is being led by Solomon, a sentient quantum intelligence (QI), also on Europa. However, once word of the crew’s discovery gets out, they soon realize that ownership of this technology could fundamentally change the balance of power within the solar system, and they now find themselves at the very nexus of a system-wide conflict. Their fight for survival plays out across the solar system, from the mining outposts of the asteroid belt to the moons of Jupiter and Saturn, and from the great Martian city of Jezero to the irradiated wastelands on Earth. This is an epic tale of humanity’s struggle for survival and meaning in a time when artificial intelligence has finally out-paced our own ability to control it. About The Belt: The story is set a century or so into the future where humanity has colonized most of the inner solar system. The asteroid belt (The Belt) is now a hive of mining activity and ships ply the trade routes to Earth and Mars. The technology depicted, for the most part, is what I consider to be technically plausible, although I do stretch it a little with quantum entanglement. That said, you won’t need a calculator or a slide-rule to enjoy the story.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin D. Mitnick - 2017
Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic
Google Drive & Docs In 30 Minutes
Ian Lamont - 2012
Millions of people use Google Drive and its popular word processor, Docs, every day. You too can use Drive and Docs to perform the following tasks: * Write letters and reports* Enter data into Sheets, Google's free online spreadsheet program* Give presentations using Slides* Collaborate online with classmates and colleagues on important documents* Convert documents to different file formats * Print documents, drawings, and spreadsheets* Export PDFs * Make pie charts, bar charts, and simple tables* Publish documents and spreadsheets onlineThere are a lot of features, including some unfamiliar ones for people who are used to Microsoft Office. "Google Drive & Docs In 30 Minutes" cuts through the clutter, using screenshots, step-by-step instructions, and plain English. After covering registration, file creation and other basics, the book zeroes in on the most important time-saving tips and productivity tools. Highlights include:* Converting files between Microsoft Office and Google Drive formats.* Best practices for organizing files in Google Drive.* What to expect with collaboration in Google Drive.* Using Google Drive on phones and tablets: What works, and what doesn't.* Accessing older versions of files.* How to publish your documents to the Web for colleagues or members of the public to view.* Sorting and filtering data in Google Spreadsheets (with examples).* Using Web Forms to gather data.* Google Slides: Is it a suitable alternative to Microsoft PowerPoint or Apple Keynote?* Working with offline files.* Downloading third-party apps."Google Drive And Docs In 30 Minutes" is an In 30 Minutes™ guide. Other books in the series include "Dropbox In 30 Minutes", "Google Blogger For Small Businesses In 30 Minutes", and "Excel Basics In 30 Minutes".
The Song Trilogy: Fire Song / Earth Song / Secret Song
Catherine Coulter - 1991
Both characters are strong and intelligent, fighting until the bitter end when they finally give in to their passions together! And as a bonus, all the characters from the previous two books are involved in the last story.
Bulletproof Ajax
Jeremy Keith - 2003
Uses progressive enhancement techniques to ensure graceful degradation (which makes sites usable in all browsers). Shows readers how to write their own Ajax scripts instead of relying on third-party libraries. Web site designers love the idea of Ajax--of creating Web pages in which information can be updated without refreshing the entire page. But for those who aren't hard-core programmers, enhancing pages using Ajax can be a challenge. Even more of a challenge is making sure those pages work for all users. In Bulletproof Ajax, author Jeremy Keith demonstrates how developers comfortable with CSS and (X)HTML can build Ajax functionality without frameworks, using the ideas of graceful degradation and progressive enhancement to ensure that the pages work for all users. Throughout this step-by-step guide, his emphasis is on best practices with an approach to building Ajax pages called Hijax, which improves flexibility and avoids worst-case scenarios.
Suze Orman's Will Trust Kit: The Ultimate Protection Portfolio
Suze Orman - 2002
It’s as easy as 1-2-3—simply personalize, print, and protect. Suze Orman and her own estate trust attorney have created the most state-of-the-art documents found anywhere. There are more than $2,500 worth of estate documents in this kit. Why pay thousands of dollars when you can get the same documents in this kit for $19.95! This kit includes:• More than 50 state-of-the-art documents• Free automatic on-line updates• Verbal and written instructions taking you step by step through the four must-have documents• Password protection securing multiple users’ information• A tutorial that shows you everything you need to know• 10 electronic books PC and Macintosh Compatible . . . and good in all 50 states!
Go in Practice
Matt Butcher - 2015
Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific strategies you can use in your day-to-day applications. You'll learn techniques for building web services, using Go in the cloud, testing and debugging, routing, network applications, and much more.
Data Structures Using C++
D.S. Malik - 2003
D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.
Skinner's Elves: A Bob Skinner Christmas Story
Quintin Jardine - 2017
Two pillars made them and supported them through their lives; now one is gone and the other is near to collapse. Can he be renewed, or has he been conquered at last? Major James Andrew Skinner, AKA Jazz Morgan, takes up the story. Quintin Jardine's 6,000 word short story is a glance into the future that was born from a joke, when he used its title as a throwaway line to a friend. 'A great title for a children's book,' she observed. This isn't a children's book, but in a real sense it's a take about children and the power they have to help us overcome, and emerge from, the deepest despair.
A Mackenzie Security Series Omnibus 2: Sizzle, Crave, Scorch
Liliana Hart - 2019
He owes Declan his life, and Declan more than has his hands full with his own family problems. Little does Archer know he’ll be chasing a would-be recruit all the way to hell and back. Or maybe Alaska just seems like hell. Audrey Sharpe works for no one but herself. Not even when the most elite security company in the country wants her. She doesn’t have time to worry about MacKenzies. She’s racing against the clock to hunt down the man who taught her everything she knows and to stop him from killing more innocent people. When sexy, but tough as nails, Archer Ryan keeps getting in her way, Audrey has to decide whether he’ll be an asset or a distraction her body and mind can’t afford. CRAVE: When Evangeline Lockwood witnesses the murder of a prominent politician, the killers will do everything they can to make sure she can't testify. Since Evangeline's father was once Deputy Director of the CIA, he knows just who to call to protect his only daughter – MacKenzie Security. The last thing Cal Colter wants is to get stuck with a babysitting job, but Declan MacKenzie has assigned him the task and he has no choice but to accept. Cal especially doesn't know what to do with the quirky computer nerd who covers her lush body in baggy clothes and her stunning violet eyes behind glasses. But if Cal knows anything, it's women, and he's just as determined to peel back the layers of this unusual woman as he is to keep her alive. SCORCH: Shane MacKenzie’s life has been turned upside down. He’s lost his command, his identity, and his will to live. He’s a dead man walking, and the only thing that makes waking up in the morning worthwhile is knowing he’ll come head to head with the one woman who gets his blood moving. Doctor Lacy Shaw spent years as a medic on the battlefield. She’s seen things that can never be erased from her memory, and when Declan MacKenzie gives her the opportunity to work for MacKenzie Security, she decides any job has to be better for the body and soul than watching soldiers die in a war zone. That’s until she meets Shane MacKenzie and realizes she’s never fought so hard for one person to live.