Touch the Sky: The inspiring stories of women from across India who are writing their own destiny


Rashmi Bansal - 2018
    BRAND NEW, Exactly same ISBN as listed, Please double check ISBN carefully before ordering.

The New Normal: explore the limits of the digital world


Peter Hinssen - 2010
    Patients are looking for information coming from a wide range of sources. Products and experiences are being discussed on the internet and shared across social media platforms. UCB is one of the first biopharma companies to acknowledge IT as core to its business strategy and to let the patient take the lead in the online conversation. This book is about the trend spotting and creative thinking needed to prepare ourselves for the world of possibilities awaiting us in the big ocean of the New Normal. Talking about the digital society could soon make you sound old and out of date - such is the pace of change. Advancement in technology is creating a 'new normal' where relationships with consumers are increasingly in a digital form. Businesses need to reinvent themselves to create new interactive business models. Technology is no longer an enabler. It has become a game-changer. Don't even think for a moment that we have arrived in the Digital World. We're probably, at best, halfway. This isn't a discussion about the glass being half-full or half-empty. The past 25 years were about technology getting into the hands of consumers. The next 25 years will see consumers, young and old, making technology part of everyday life. Digital has become the New Normal. An entrepreneur, advisor, lecturer and writer, Peter Hinssen (1969) is one of Europe's most sought-after thought leaders on the impact of technology on society and business. He is frequently called upon to lead seminars and consult on issues related to the adoption of technology by consumers, the impact of the networked digital society, and the Fusion between business and IT.

sed & awk


Dale Dougherty - 1990
    The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).

Game Development Essentials: An Introduction


Jeannie Novak - 2004
    This book not only examines content creation and the concepts behind development, but it also give readers a background on the evolution of game development and how it has become what it is today. GAME DEVELOPMENT ESSENTIALS also includes chapters on project management, development team roles and responsibilities, development cycle, marketing, maintenance, and the future of game development. With the same engaging writing style and examples that made the first two editions so popular, this new edition features all the latest games and game technology. Coverage of new game-related technology, development techniques, and the latest research in the field make this an invaluable resource for anyone entering the exciting, competitive, ever-changing world of game development.

They Did What!?: The Funny, Weird, Wonderful, Outrageous, and Stupid Things Famous People Have Done


Bob Fenster - 2002
    Author Bob Fenster has captured all their hilarious, behind-the-scenes antics in They Did What!? Consider, for example:o The Beach Boys originally wanted to call their group the Pendletons, so they could get free shirts from the Oregon clothing manufacturer.o At her wedding, movie star Lana Turner had "I love you" spelled out in pimentos in the sides of baked hams.o Before they hit it big in the movies, Angelina Jolie studied to be a funeral director and Sean Connery polished coffins.Filled with hundreds of fascinating escapades and interesting idiosyncrasies, They Did What!? also looks at issues associated with fame, such as "Why do famous people marry other famous people?" and includes tongue-in-cheek lessons we can learn from celebrities, like "How to become famous and still get into heaven."

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

101 Poems To Get You Through The Day (And Night)


Daisy Goodwin - 2003
    More witty and stylish poetic therapy for the Venus and Mars generation.

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

PHP Pocket Reference


Rasmus Lerdorf - 2000
    The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.

The Hacker Diaries: Confessions of Teenage Hackers


Dan Verton - 2001
    He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.

Fighter Pilot


Mac 'Serge' Tucker - 2012
    Now, for the first time, Serge takes you behind the scenes of the fighter pilot world to reveal what it's really like. Find out how it feels to be shot at by SAS snipers, to be lost in a $50 million jet over Northern Australia with nothing but car lights to guide you home, to rupture your sinuses while flying, to inadvertently bomb a yacht and to face death on an almost daily basis. Relive the adventures of a real-life Top Gun and find out what it takes to become part of this elite force. From the Pentagon to the South China Sea, the deserts of Australia to the wars of the Middle East, this book is as action-packed as it is entertaining. Sit back and strap yourself in for an exhilarating ride to the sound barrier and beyond with Mac Tucker, an Australian fighter pilot and real life Top Gun.

You Really Got Me: The Story of the Kinks


Nick Hasted - 2010
    The Kinks are the quintessential British sixties band, revered for an incredible series of classic songs ("You Really Got Me," "Waterloo Sunset" and "Lola" to name but a few) and critically acclaimed albums such as The Village Green Preservation Society. Featuring original interviews with key band members Ray Davies, his brother Dave Davies and Mick Avory, as well as Chrissie Hynde and many others close to the group, every stage of their career is covered in fascinating detail: the hits, the American successes of the 1970s and the legendary band in-fighting.  Nearly 50 years after they formed, the Kinks' influence is still being felt today as strongly as ever.

Bro Don't Like That La Bro Origins: Back To School


Ernest Ng - 2014
    It was tough. There were just so many things to keep track of. Cartoons, toys, snacks, school, homework and other kids' stuff. We had no money and we were supposed to listen to everything our parents and teachers said even when they did not make any sense.But we still did whatever we liked anyway.This book tells the childhood stories of five close friends, specifically how they met and became close friends even until today. Some of the stories in here might remind you what it was like when you were a kid.This is the origin story of the Bros from the "Bro, Don't Like That La, Bro" comic series and how different things were back then when nobody knew what the word 'Internet' meant.

The Man From Taured


Bryan W. Alaspa - 2015
    He carries a passport, driver’s license, papers, all of it looking legit. There’s just one thing that causes the customs agent to raise the alarm – the passport and license are from a country that does not, and has never, existed. That's the famous urban legend you may have heard before. It was just the start of the story... Then he vanishes. Noble Randle, working for Homeland Security, is called in to investigate. The solution, he figures, has to be something simple. What he does not know is that his life is about to change, that he has a very unique ability, and that the fate of this universe and thousands of others rests in his hands. The walls between dimensions and parallel universes are breaking down. Behind it is an evil as old as time itself. An evil that wants to devour every other universe and gain total control over everyone and everything. The Man from Taured is a story that ranges from horror, to action, mystery and suspense. An epic tale that wonders: is there more to this world than we know? Are there other universes, other dimensions, right nearby? Perhaps as close as a breath away. From suspense, horror and mystery writer Bryan W. Alaspa comes a tale that crosses generations, and dimensions. A story that will challenge your perception of reality itself, and keep you up late at night, afraid to answer the knock at the door. Who is THE MAN FROM TAURED?

NSHipster: Obscure Topics in Cocoa & Objective C


Mattt Thompson - 2013
    In cultivating a deep understanding and appreciation of Objective-C, its frameworks and ecosystem, one is able to create apps that delight and inspire users. Combining articles from NSHipster.com with new essays, this book is the essential guide for modern iOS and Mac OS X developers.