Microsoft .NET - Architecting Applications for the Enterprise


Dino Esposito - 2014
    But the principles and practices of software architecting–what the authors call the “science of hard decisions”–have been evolving for cloud, mobile, and other shifts. Now fully revised and updated, this book shares the knowledge and real-world perspectives that enable you to design for success–and deliver more successful solutions. In this fully updated Second Edition, you will: Learn how only a deep understanding of domain can lead to appropriate architecture Examine domain-driven design in both theory and implementation Shift your approach to code first, model later–including multilayer architecture Capture the benefits of prioritizing software maintainability See how readability, testability, and extensibility lead to code quality Take a user experience (UX) first approach, rather than designing for data Review patterns for organizing business logic Use event sourcing and CQRS together to model complex business domains more effectively Delve inside the persistence layer, including patterns and implementation.

Eleventh Hour CISSP®: Study Guide


Eric Conrad - 2016
    This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time

Kellogg on Marketing


Alice M. Tybout - 2000
    This is a must-have marketing reference.

Designing Sound


Andy Farnell - 2010
    Its thesis is that any sound can be generated from first principles, guided by analysis and synthesis. The text takes a practitioner's perspective, exploring the basic principles of making ordinary, everyday sounds using an easily accessed free software. Readers use the Pure Data (Pd) language to construct sound objects, which are more flexible and useful than recordings. Sound is considered as a process, rather than as data--an approach sometimes known as "procedural audio." Procedural sound is a living sound effect that can run as computer code and be changed in real time according to unpredictable events. Applications include video games, film, animation, and media in which sound is part of an interactive process. The book takes a practical, systematic approach to the subject, teaching by example and providing background information that offers a firm theoretical context for its pragmatic stance. [Many of the examples follow a pattern, beginning with a discussion of the nature and physics of a sound, proceeding through the development of models and the implementation of examples, to the final step of producing a Pure Data program for the desired sound. Different synthesis methods are discussed, analyzed, and refined throughout.] After mastering the techniques presented in Designing Sound, students will be able to build their own sound objects for use in interactive applications and other projects

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Exploring CQRS and Event Sourcing


Dominic Betts - 2012
    It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques.The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical.The CQRS pattern and event sourcing are not mere simplistic solutions to the problems associated with large-scale, distributed systems. By providing you with both a working application and written guidance, we expect you’ll be well prepared to embark on your own CQRS journey.

Imran Khan


Christopher Sandford - 2009
    On one thing, Imran Khan's friends and enemies agree: it all began with the leopard print satin trousers. In November 1974, the Cricketer International published an article about the new elite group of young talented players, "into concepts like fashion and pop music," and bent on challenging cricket's eternal stereotypes. Of the five featured stars on the cover, a superbly hirsute 21-year-old wearing a tight black shirt and gaudy trousers, with a facial expression of supreme self-confidence, stood out. Imran Khan has always been a controversial figure, a man who gives rise to hot debate on account of his strong conviction and hard line views. From his achievements on the cricket field as the Pakistan captain who captured the World Cup and the game's best all-rounder in history, through to his racy social life—the practicing Muslim boogieing on the dancefloor of Annabel's; an "astonishing lovemaker," according to one overnight partner; praised by Diana Princess of Wales, close friend to his then wife Jemima Goldsmith, as a "devoted husband"—the Imran story is full of color and contradictions. Acclaimed biographer Christopher Sandford has approached a richly varied cast list of Imran associates past and present—from Geoff Boycott, Javed Miandad, Mike Brearley, David Gower, and John Major through to Nelson Mandela and close acquaintances such as Eric Clapton, Mick Jagger, John Major, Keith Richards, sources close to the late Princess of Wales, and Pakistan's General Musharraf. Imran Khan himself and his ex-wife Jemima have agreed to be interviewed for the book and given Sandford exclusive access to Imran's inner sanctum.

Zombie: A Horror Novel (The Cursed Manuscripts)


Iain Rob Wright - 2022
    It didn't. But on that day, 113 mysterious manuscripts were discovered around the world, each one written in blood by an unknown author. After several dozen unexplained deaths befell the finders of said manuscripts, a decision was made to lock them up for good in a secret vault beneath the Vatican. It is said that anyone who reads the stories will die, and as such they are now referred to as 'The Cursed Manuscripts.'In December 2020, new manuscripts started turning up around the world. 'Zombie' was one of them.

Haskell: The Craft of Functional Programming


Simon Thompson - 1996
    Running examples and case studies highlight new concepts and alternative approaches to program design.

Practical Object Oriented Design in Ruby


Sandi Metz - 2012
    The Web is awash in Ruby code that is now virtually impossible to change or extend. This text helps you solve that problem by using powerful real-world object-oriented design techniques, which it thoroughly explains using simple and practical Ruby examples. Sandi Metz has distilled a lifetime of conversations and presentations about object-oriented design into a set of Ruby-focused practices for crafting manageable, extensible, and pleasing code. She shows you how to build new applications that can survive success and repair existing applications that have become impossible to change. Each technique is illustrated with extended examples, all downloadable from the companion Web site, poodr.info. The first title to focus squarely on object-oriented Ruby application design, Practical Object-Oriented Design in Ruby will guide you to superior outcomes, whatever your previous Ruby experience. Novice Ruby programmers will find specific rules to live by; intermediate Ruby programmers will find valuable principles they can flexibly interpret and apply; and advanced Ruby programmers will find a common language they can use to lead development and guide their colleagues. This guide will help you Understand how object-oriented programming can help you craft Ruby code that is easier to maintain and upgrade Decide what belongs in a single Ruby class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed Ruby code

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

The Short Cut (Western Murder Mystery)


Jackson Gregory - 2007
    Has he sighted something? Who is the dead man? Is there a threat to her very life?Jackson Gregory was an American teacher, journalist, and writer. Gregory authored more than 40 fiction novels and a number of short stories. Several of his tales were used as the basis of films released between 1916 and 1944, including the 1917 film titled "The Man from Painted Post."

Data Structures: A Pseudocode Approach with C


Richard F. Gilberg - 1998
    A new four-part organizational structure increases the flexibility of the text, and all material is presented in a straightforward manner accompanied by an array of examples and visual diagrams.

Introduction to Geographic Information Systems [With CDROM]


Kang-Tsung Chang - 2001
    Now in its 12th edition, it is still the market leader and is known for its scientific research base and its currency, comprehensiveness, and accuracy.

Fundamentals of Biostatistics (with CD-ROM)


Bernard Rosner - 1982
    Fundamentals of Biostatistics with CD-Rom.