Refactoring: Improving the Design of Existing Code


Martin Fowler - 1999
    Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, non-optimal applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as refactoring, these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use... until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.

Sherman's Library


Ron Ripley - 2015
    Sherman’s death sparks one of the wildest, weirdest adventures he’s ever had… Upon Mr. Sherman’s death, Charles learns the rich old gentleman gave away all his money, leaving only his Victorian mansion and the huge library in the house. His will clearly stipulates the new owner must keep the library intact. Of course, with Mr. Sherman being dead, how would he know or even care about the library? It isn’t until Charles buys the house and discovers someone has stolen items from the library that he understands the significance of keeping the library intact. Mr. Sherman’s letter to the new owner shares the secret of the library—every item in the library is haunted! But how can Charles ever imagine just how deadly the library keeper’s job is…or the blood bath that will follow if he fails to “protect and serve” according to Mr. Sherman’s will?

Direction & Quality of Light: Your Key to Better Portrait Photography Anywhere


Neil van Niekerk - 2013
    Acclaimed photographer Neil van Niekirk presents seven distinctly different lighting scenarios—available light, exposure metering, a touch of flash, bounced on-camera flash, off-camera flash, video light, and hard sunlight—to show readers how to manipulate the direction and quality of light, the subject’s and photographer’s position, and numerous other variables so as to turn a bad image into a stunning, professional-level portrait. Packed with dozens of instructional, full-color photos, this work also features 10 sample photo sessions, allowing readers the opportunity to see the seven lighting scenarios put to practice.

Structures: Or Why Things Don't Fall Down


J.E. Gordon - 1978
    Gordon strips engineering of its confusing technical terms, communicating its founding principles in accessible, witty prose.For anyone who has ever wondered why suspension bridges don't collapse under eight lanes of traffic, how dams hold back--or give way under--thousands of gallons of water, or what principles guide the design of a skyscraper, a bias-cut dress, or a kangaroo, this book will ease your anxiety and answer your questions.Structures: Or Why Things Don't Fall Down is an informal explanation of the basic forces that hold together the ordinary and essential things of this world--from buildings and bodies to flying aircraft and eggshells. In a style that combines wit, a masterful command of his subject, and an encyclopedic range of reference, Gordon includes such chapters as "How to Design a Worm" and "The Advantage of Being a Beam," offering humorous insights in human and natural creation.Architects and engineers will appreciate the clear and cogent explanations of the concepts of stress, shear, torsion, fracture, and compression. If you're building a house, a sailboat, or a catapult, here is a handy tool for understanding the mechanics of joinery, floors, ceilings, hulls, masts--or flying buttresses.Without jargon or oversimplification, Structures opens up the marvels of technology to anyone interested in the foundations of our everyday lives.

Catholic Book of Prayers


Maurus Fitzgerald - 2011
    Compiled and edited by Rev. Maurus Fitzgerald this prayer book has been updated in accord with the Roman Missal. With a helpful summary of our Catholic Faith, this useful prayer book will prove invaluable for making regular prayer easy and meaningful.

The Funniest Thing You Never Said: The Ultimate Collection of Humorous Quotations


Rosemarie Jarski - 2004
    Quotations are ordered not by A-Z, but by thematic categories: love; business; religion; celebrity, you name it, every category is covered. The collection includes all the classics from Oscar Wilde to Winston Churchill, Dorothy Parker to Groucho Marx but also mines many new hidden gems from lesser lights and includes many contemporary quotes by everyone from Jilly Cooper to Jonathan Ross. A standard companion for new collectors, and a fresh perspective for serious quotation addicts.

Beyond Budgeting: How Managers Can Break Free from the Annual Performance Trap


Jeremy Hope - 2003
    Worse, it often causes dysfunctional and unethical managerial behavior. Based on an intensive, international study into pioneering companies, Beyond Budgeting offers an alternative, coherent management model that overcomes the limitations of traditional budgeting. Focused around achieving sustained improvement relative to competitors, it provides a guiding framework for managing in the twenty-first century.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

C: The Complete Reference


Herbert Schildt - 1987
    You'll get in-depth coverage of the C language and function libraries as well as all the newest C features, including restricted pointers, inline functions, variable-length arrays, and complex math. This jam-packed resource includes hundreds of examples and sample applications.

The Science of the Hitchhiker's Guide to the Galaxy


Michael Hanlon - 2005
    Douglas Adams was a science and technology enthusiast and his books were inspired by--and sometimes, prefigured--many of the great scientific debates of our time. The Science of The Hitchhiker's Guide to the Galaxy is a lighthearted, accessible and informative tour of the real cutting-edge research behind this much-loved classic, including space tourism, parallel universes, instant translation devices, sentient computers, and more.

HTML5 and CSS3 (Visual QuickStart Guide)


Elizabeth Castro - 2011
    In this completely updated edition of our best-selling guide to HTML, authors Elizabeth Castro and Bruce Hyslop use crystal-clear instructions and friendly prose to introduce you to all of today's HTML5 and CSS essentials. You'll learn how to design, structure, and format your website. You'll learn about the new elements and form input types in HTML5. You'll create and use images, links, styles, lists, tables, frames, and forms; and you'll add video, audio, and other multimedia to your site. You'll learn how to add visual effects with CSS3. You'll understand web standards and learn from code examples that reflect today's best practices. Finally, you will test and debug your site, and publish it to the web. Throughout the book, the authors will cover all of HTML and offer extensive coverage of HTML5 and CSS techniques.

Beyond a Misty Shore


Lyn Andrews - 2011
    For sisters Sophie and Maria, though, the upheaval is just beginning. For they have no choice but to leave their beloved home on the Isle of Man. It is a huge wrench for eighteen-year-old Maria, who can't forget Hans Bonhoeffer, a young Austrian, interned on the island during the war. For widowed Sophie, Liverpool offers a new beginning with her daughter Bella. She has no room for distractions - until she falls in love with Frank Ryan, a man married to a woman who, although she doesn't love him, has no intention of letting him go. Without the men they love, will the sisters ever find happiness?

Exam Ref 70-480: Programming in HTML5 with JavaScript and CSS3


Rick Delorme - 2013
    Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Implement and manipulate document structures and objectsImplement program flowAccess and secure dataUse CSS3 in applicationsThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)

How To Unblock Everything On The Internet


Ankit Fadia - 2012
    Chat Software Stock Trading Websites. Career Websites. USB Ports. Download & Speed Limits. Torrents And just about everything else!Who should read this book? College Students. Office Goers. Travelers to countries where websites are blocked (China, UAE, Saudi Arabia and others). Anybody else who wants to unblock stuff on the Internet.About The AuthorAGE 10 - Gifted a computer at home by his parents.AGE 12 - Developed an interest in Computer Hacking.AGE 14 - Published his first book titled The Unofficial Guide to Ethical Hacking which became an instant bestseller worldwide, sold 3 million copies and was translated into 11 languages.AGE 16 - After the Sept. 11th attacks, cracked an encrypted email sent by the Al-Qaeda terrorist network for a classified intelligence agency.AGE 26 - Widely recognized as a Computer Security Expert and Cyber Terrorism guru. Written 14 bestselling books, delivered more than 1000 talks in 25 countries, received 45 awards, has trained more than 20,000 people in India & China, hosts his own TV show called MTV What the Hack!, is writing a script for a movie, runs his own consulting company and also went to Stanford University. His work has touched & influenced the cyber lives of millions of individuals and organizations worldwide.

The Search: A Walker Series Thriller


Alex Howell - 2019
    Though burdened by his past, Mason has found contentment in the anonymity of his family life in Baltimore, Maryland. And then his daughter gets kidnapped. Upon returning home for lunch one day, Mason comes home to find his house destroyed, his daughter gone, and security footage of her in an anonymous bunker. A voice advises that she will only be safe if Mason does exactly as he’s told. Will Mason be able to reclaim his old skills to save his daughter? Can he use his ingenuity to save her before he’s too late? What will it cost him?