HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications


Juan Diego Gauchat
    

The Singularity is Near: When Humans Transcend Biology


Ray Kurzweil - 2005
    In his classic The Age of Spiritual Machines, he argued that computers would soon rival the full range of human intelligence at its best. Now he examines the next step in this inexorable evolutionary process: the union of human and machine, in which the knowledge and skills embedded in our brains will be combined with the vastly greater capacity, speed, and knowledge-sharing ability of our creations.

Mastering Excel Macros: Introduction (Book 1)


Mark Moore - 2014
    Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.

User-Centered Design: A Developer's Guide to Building User-Friendly Applications


Travis Lowdermilk - 2013
    With practical guidelines and insights from his own experience, author Travis Lowdermilk shows you how usability and user-centered design will dramatically change the way your application interacts with people.You’ll learn valuable strategies for conducting each stage of the design process, from interviewing likely users and discovering your application’s purpose to creating a rich user experience with sound design principles. User-Centered Design is invaluable no matter what platform you use or audience you target.- Explore usability and how it relates to user-centered design- Learn how to deal with users and their unique personalities- Clarify your application’s purpose, using a simple narrative to describe its use- Plan your project’s development with a software development life cycle- Be creative within the context of your user experience goals- Use visibility, consistency, and other design principles to enhance user experience- Gain user feedback of your prototype with surveys, interviews, and usability studies

The Well-Grounded Java Developer: Vital techniques of Java 7 and polyglot programming


Benjamin J. Evans - 2012
    New JVM-based languages like Groovy, Scala, and Clojure are redefining what it means to be a Java developer. The core Standard and Enterprise APIs now co-exist with a large and growing body of open source technologies. Multicore processors, concurrency, and massive data stores require new patterns and approaches to development. And with Java 7 due to release in 2011, there's still more to absorb.The Well-Grounded Java Developer is a unique guide written for developers with a solid grasp of Java fundamentals. It provides a fresh, practical look at new Java 7 features along with the array of ancillary technologies that a working developer will use in building the next generation of business software.

97 Things Every Programmer Should Know: Collective Wisdom from the Experts


Kevlin Henney - 2010
    With the 97 short and extremely useful tips for programmers in this book, you'll expand your skills by adopting new approaches to old problems, learning appropriate best practices, and honing your craft through sound advice.With contributions from some of the most experienced and respected practitioners in the industry--including Michael Feathers, Pete Goodliffe, Diomidis Spinellis, Cay Horstmann, Verity Stob, and many more--this book contains practical knowledge and principles that you can apply to all kinds of projects.A few of the 97 things you should know:"Code in the Language of the Domain" by Dan North"Write Tests for People" by Gerard Meszaros"Convenience Is Not an -ility" by Gregor Hohpe"Know Your IDE" by Heinz Kabutz"A Message to the Future" by Linda Rising"The Boy Scout Rule" by Robert C. Martin (Uncle Bob)"Beware the Share" by Udi Dahan

Programming Pearls


Jon L. Bentley - 1986
    Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem." - Steve McConnell, author, Code CompleteWhen programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that Programming Pearls has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect current programming methods and environments. In addition, there are three new essays on (1) testing, debugging, and timing; (2) set representations; and (3) string problems. All the original programs have been rewritten, and an equal amount of new code has been generated. Implementations of all the programs, in C or C++, are now available on the Web.What remains the same in this new edition is Bentley's focus on the hard core of programming problems and his delivery of workable solutions to those problems. Whether you are new to Bentley's classic or are revisiting his work for some fresh insight, this book is sure to make your own list of favorites.

Deadly Secrets Royalty: Brothers that Bite Book 5 (Deadly Secrets Brothers That Bite)


E. Bowser - 2020
    Now forever means something vastly different for the two best friends. Taria just being a college student she never thought she would run into a vampire serial killer or being accused of murder, to becoming a vampire herself. Taria never thought that asking for excitement in her life she would end up with Michael a sexy vampire with deadly secrets but who made her his Queen. Michael has always seen visions, but he never saw Taria coming into his life. The couple is more than just lovers but soulmates who were destined to be together. Michael can feel his power growing as the New Year approaches as he fights whoever attacks his family and friends. He knows that he must protect his people as he takes the throne, but before that can happen, he had to take the Van Allans down. With Taria by his side, Michael knows he can defend and rule the vampire covens, or they would die trying. LaToya never imagined finding someone who loves her enough to let her be herself. She never thought she would have children and now can’t Imagine life without them. LaToya went looking for answers about herself and found that she was more than what she appeared. Quinn with deadly secrets himself found his mate and would never let her go. Finally finding of his own past, he has to find the True Alpha inside if he wants to keep his mate, children, and all wolf shifter packs safe. Enemies are all around the friends who became more. They found allies, friends and more secrets to uncover but before they can move on to their next adventure in their lives, they had to deal with the fact something wants to end the world, and another wants to rule it. It's up to these four to make it right even at the cost of their own lives. They will come to realize nothing lives forever. Will Michael gain the power that belongs to him or will Victor Van Allan finally take it? Will Quinn be able to be the True Alpha of his kind? Will LaToya keep her children safe while learning to use her birth given gifts? Will Taria be able to fulfill her hunter role, help Michael rule the vampire covens, and finally figure out the power that is hidden inside of her? Who will make it in this last installment of Deadly Secrets Brothers That Bite? This story will be best read if you read Deadly Secrets Brothers that Bite 1-4, Desire of the Harvest Moon: The Change, Twice Marked Witches and Wolves first.

Young Love in Memphis: Heart on Reserve


B. Love - 2016
    In part one of Young Love in Memphis: Heart on Reserve – Grace, Braille, and Jessica begin their journey into womanhood. Grace’s life had never been normal. She grew up with a father who showed his love only through providing and protecting, and a mother who was so submissive that she allowed her husband to keep her from giving Grace the love and nurture every young girl needs. When Grace was sixteen she left Memphis to be with her boyfriend, Andy. Almost two years later, Grace finds herself sneaking back into Memphis, praying her parents and Andy never find out. But Andy does. And he refuses to let her go easily. Braille grew up with a single mother. Her entire life has centered around loving her Mother, getting good grades in school, and becoming a Nurse. A flat tire on one of the hottest days in Spring causes her to meet Lorenzo, a young dope boy whose life is going down a completely different path, and her life is changed forever because of it. After watching her sister love, lose, and die because of it, Jessica vowed to never fully commit herself to love or a man. Then she met Cameron. And his love and gentle pursuit of her changed her mind. When Cameron left for college she thought she could get back to her normal routine of enjoying life and messing around with whoever she wanted to, but Cameron didn’t want to let her go so easily. As she tries to enjoy her last year of high school and maintain a long distance relationship she meets Vega, Lorenzo’s best friend. Their encounter leaves her in a love triangle she’s not sure she wants to get out of. In this captivating series, these girls are all left with two options – live and love while they’re young, or place their hearts on reserve to live wild and free. Which will they choose? Join them in part one to find out!

red velvet villainy


Molly Maple - 2022
    The beloved Gus wouldn't hurt a fly, so when he ends up in the hospital after being attacked, no one quite knows where to point the finger.With the restaurant hanging on by a thread and a criminal on the loose, Charlotte knows she will have to solve this crime with a soup ladle in one hand and a cupcake pan in the other. When it becomes clear that there is more to the coveted soup recipes than meets the eye, Charlotte is certain that the person who attacked Gus won't stop until Gus is silenced once and for all."Red Velvet Villainy" is filled with layered clues and cozy moments, written by Molly Maple, which is a pen name for a USA Today bestselling author.

Patricia Fisher: Ship's Detective


Steve Higgs - 2021
    

The Flash Omnibus, Volume 2


Geoff Johns - 2012
    The second in a series of hardcover volumes that collect all of the best-selling issues of THE FLASH written by comics superstar Geoff Johns.In this massive FLASH collection, an old friend of Wally West becomes the portal to another universe and Gorilla Grodd goes wild in Keystone City! Plus, don't miss the Fastest Man Alive's clashes with members of his infamous rogues gallery, including Captain Cold, The Trickster, the Pied Piper and more!Collects THE FLASH #177-200 and DC FIRST: FLASH/SUPERMAN #1

RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition (Certification Press)


Michael Jang - 2011
    100 complete coverage of all official objectives for Exams EX200 and EX300 Exam Readiness Checklist-youre ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review 100 lab questions-two full lab-based RHCSA exams and two full lab-based RHCE exams-match the format, tone, topics, and difficulty of the real exam Covers all the exam topics, including Virtual Machines and Automated Installations Fundamental Command Line Skills RHCSA-Level Security Options The Boot Process Linux Filesystem Administration Package Management User Administration RHCSA-Level System Administration RHCE Security System Services and SELinux RHCE Administration Mail Servers Samba File Sharing DNS, FTP, and Logging CD-ROM includes Complete lab-based exam preparation, featuring Two full RHCSA practice exams Two full RHCE practice exams Lab-based chapter self tests In-depth answer explanations for all labs RHCSA and RHCE Glossary PDF copy of the book for studying on the go Michael Jang, RHCE, LPIC-2, UCP, LCP, MCP, is the author of three previous bestselling editions of RHCE Red Hat Certified Engineer Linux Study Guide and several other books on Linux and professional certification.

Digital Expressions: Creating Digital Art with Adobe Photoshop Elements


Susan Tuttle - 2010
    Now imagine expressing that dream artistically. With Digital Expressions you can take ordinary photos and, with the help of Adobe Photoshop Elements, voice your flights of fancy. Digital Expressions guides you through 25 digital art projects created with Adobe Photoshop Elements. With this easy-to-follow guide, you'll get inspired to tackle all kinds of digital mixed-media techniques using stock photography, custom brushes, textured backgrounds and your own digital photos. Use your digital palette to:· Manipulate single images by adding texture layers, color fills and text· Re-create the look of traditional art like drawings and abstract paintings· Build collages using transparent layers and photo filters· Blend seamless montages with various effects · Incorporate your own traditional art into digital worksMixed-media artists, art journalers and scrapbookers alike can turn the ordinary into extraordinary! Express yourself in digital form as you learn to master creative digital art techniques. **Bonus CD includes assorted brushes, photos and textures you can use to create on your own digital canvas.** PLEASE NOTE that one of the images was left off of the CD by mistake. You can download it from the "Books" section of the author's website at ilkasattic.com**

Writing Secure Code


Michael Howard - 2001
    You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.