Make: AVR Programming: Learning to Write Software for Hardware (Make : Technology on Your Time)


Elliot Williams - 2013
    In this book you'll set aside the layers of abstraction provided by the Arduino environment and learn how to program AVR microcontrollers directly. In doing so, you'll get closer to the chip and you'll be able to squeeze more power and features out of it.Each chapter of this book is centered around projects that incorporate that particular microcontroller topic. Each project includes schematics, code, and illustrations of a working project. Program a range of AVR chips Extend and re-use other people’s code and circuits Interface with USB, I2C, and SPI peripheral devices Learn to access the full range of power and speed of the microcontroller Build projects including Cylon Eyes, a Square-Wave Organ, an AM Radio, a Passive Light-Sensor Alarm, Temperature Logger, and more Understand what's happening behind the scenes even when using the Arduino IDE

Feast for Thieves: A Rowdy Slater Novel


Marcus Brotherton - 2014
    An impossible choice for a man who usually solves his problems with a rifle or his fists.Sergeant Rowdy Slater was the most incorrigible paratrooper in Dog Company during World War II. But after the war, when Rowdy robs a bank with the black-hearted Crazy Ake, he vows to turn his life around. The lawman, suspicious that Rowdy’s confession is a sham, gives him an ultimatum: Rowdy must serve for one year as the town minister, or go straight to jail. Rowdy’s choice? Preaching at the community church in Cut Eye, Texas, at the midpoint of nowhere and emptiness.At first the job seemed easy, particularly since Rowdy took over for the willowy female missionary who held the church together while the men were at war. But when Crazy Ake shows up with a plan to make some quick cash, Rowdy becomes ensnared and is forced to make a deadly choice.

The Unofficial LEGO Technic Builder's Guide


Paweł "Sariel" Kmieć - 2012
    Using motors, gears, pneumatics, pulleys, linkages, and more, you can design LEGO models that really move.The Unofficial LEGO Technic Builder's Guide is filled with building tips for creating strong yet elegant machines and mechanisms with the Technic system. Author Pawel "Sairel" Kmiec will teach you the foundations of LEGO Technic building, from simple machines to advanced mechanics, even explaining how to create realistic to-scale models. Sariel, a world-renowned LEGO Technic expert, offers unique insight into mechanical principles like torque, power translation, and gear ratios, all using Technic bricks. You'll learn how to:Create sturdy connections that can withstand serious stressRe-create specialized LEGO pieces like casings and u-joints, and build solutions like Schmidt and Oldham couplings, when no standard piece will doBuild custom differentials, suspensions, transmissions, and steering systemsPick the right motor for the job—and transform its properties to suit your needsCombine studfull and studless building styles for a stunning lookCreate remote-controlled vehicles, lighting systems, motorized compressors, and pneumatic enginesThis beautifully illustrated, full-color book will inspire you with ideas for building amazing machines like tanks with suspended treads, supercars, cranes, bulldozers, and much more. Your Technic adventure starts now!

Codebreakers' Victory: How the Allied Cryptographers Won World War II


Hervie Haufler - 2003
    From the Purple Machine to the Navajo Talkers to the breaking of Japan's JN-25 Naval Code to the shadowy world of decoding units like Hut-8 in Bletchley Park, he shows how crucial information-often obtained by surreptitious and violent means-was the decisive edge in the Battle of Britain, at Midway and against the U-Boats in the North Atlantic, and how Allied intelligence saved the Soviet Union from almost certain defeat. In an accessible account based on years of research, interviews and exclusive access to previously top-secret archives, Haufler demonstrates how cryptography enabled Nimitz and MacArthur to persevere in the Pacific and helped Eisenhower and Patton mount the assaults on Normandy. In compelling detail, Haufler shows us how it was done-as only one who was on the frontlines of the "secret war" could tell it.

Bluey: The Beach: A Lift-the-Flap Book


Bluey - 2019
    What will you discover along the way?While Mum is off for a walk along the beach, Bluey discovers a beautiful shell. She runs to show Mum and has a series of encounters that will both excite and test her in unexpected ways.Bluey has been a phenomenal success since airing on ABC KIDS in October 2018, amassing legions of dedicated fans and taking the coveted position of being the most watched program ever on ABC iView, with over 100 million plays. It has also topped the Australian iTunes Kids Chart with the series peaking at #1 and consistently remaining in the Top 5.

Bitcoin Widow: Love, Betrayal and the Missing Millions


Jennifer Robertson - 2022
    Then, in one fateful night, she lost everything, and the nightmare beganJennifer Robertson was working hard to build a life for herself from the ashes of her first marriage. Still only twenty-six, she swiped right on a dating app and met Gerry Cotten, a man she would not normally have considered—too young and not her type—but found she’d met her match. Eccentric but funny and kind, Cotten turned out to be a bitcoin wizard who quickly amassed substantial wealth through his company, Quadriga. The couple travelled the world, first-class all the way, while Cotten worked on his multitude of encrypted laptops. Then, while the couple was on their honeymoon in India, opening an orphanage in their name, Gerry fell ill and died in a matter of hours. Jennifer was consumed by grief and guilt, but that was only the beginning. It turned out that Gerry owed $250 million to Quadriga customers, and all the passwords to his encrypted virtual vaults, hidden on his many laptops, had died with him. Jennifer was left with more than one hundred thousand investors looking for their money, and questions, suspicions and accusations spiralling dangerously out of control. The Quadriga scandal touched off major investment and criminal investigations, not to mention Internet rumours circulating on dark message boards, including claims that Gerry had faked his own death and that his wife was the real mastermind behind a sophisticated sting operation. While Jennifer waited for a dead man’s switch e-mail that would probably never come, it became clear that Cotten had gambled away about $100 million of the funds entrusted to him for investment in his many schemes, leaving Robertson holding the bag. Bitcoin Widow is Catch Me If You Can meeting a widow betrayed, a life of fairy-tale romance and private jets torched by duplicity, as Jennifer Robertson tries to reset her life in the wake of one of the biggest investments scandals of the digital age.

Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners


Chris Dannen - 2017
    Blockchain protocols are taking the world by storm, and the Ethereum project, with its Turing-complete scripting language Solidity, has rapidly become a front-runner. This book presents the blockchain phenomenon in context; then situates Ethereum in a world pioneered by Bitcoin.See why professionals and non-professionals alike are honing their skills in smart contract patterns and distributed application development. You'll review the fundamentals of programming and networking, alongside its introduction to the new discipline of crypto-economics. You'll then deploy smart contracts of your own, and learn how they can serve as a back-end for JavaScript and HTML applications on the Web.Many Solidity tutorials out there today have the same flaw: they are written for "advanced" JavaScript developers who want to transfer their skills to a blockchain environment. Introducing Ethereum and Solidity is accessible to technology professionals and enthusiasts of all levels. You'll find exciting sample code that can move forward real world assets in both the academic and the corporate arenas. Find out now why this book is a powerful gateway for creative technologists of all types, from concept to deployment.What You'll LearnSee how Ethereum (and other cryptocurrencies) workCompare distributed apps (dapps) to web appsWrite Ethereum smart contracts in Solidity Connect Ethereum smart contracts to your HTML/CSS/JavaScript web applicationsDeploy your own dapp, coin, and blockchainWork with basic and intermediate smart contractsWho This Book Is For Anyone who is curious about Ethereum or has some familiarity with computer science Product managers, CTOs, and experienced JavaScript programmersExperts will find the advanced sample projects in this book rewarding because of the power of Solidity

The Hacker Diaries: Confessions of Teenage Hackers


Dan Verton - 2001
    He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Elphie and Dad go on an Epic adventure


Hagit R. Oron - 2016
    Hagit R. Oron and Or Oron have written a book which not only details the principle of “look before you leap,” but also shows how imaginative children can be. Elphie’s facial expressions emoted perfectly what he was thinking and feeling during the entire journey, whether it was boredom, excitement, or fear. Elphie and Dad Go On an Epic Adventure would be a wonderful book to read at bedtime for smaller children, teaching them about road danger, adventure, and using your imagination to have fun." - Rosie Malezer for Readers’ FavoriteFor Elphie, everything is an adventure. But dad is cautious. Is dad going to join Elphie on his quest or is the trip to the shop going to be dull and boring? Join Elphie and dad to find out! "Elphie and dad go on an epic adventure" is a fun beautifully illustrated book that addresses kids and parents alike. It shows how you can transform everyday chores into exciting adventures. Bonus! Free gift for every buyer: an illustrated booklet with an extra-special-epic-adventure chocolate milk recipe for kids and their dads to make together.

mobilized: An Insider's Guide to the Business and Future of Connected Technology


S.C. Moatti - 2016
    Everybody knows mobile is the future, and every business wants in, but what are the elements of mobile success? SC Moatti, a Silicon Valley veteran, has created a unique Mobile Formula that makes it easy for any business to develop a strategy for creating mobile products that count. Moatti argues that we so identify with our mobile products that we expect from them what we wish for ourselves: an attractive body, a meaningful life, and increasing competence and ability. So the Body Rule dictates that mobile products must appeal to our sense of beauty but beauty in a mobile world is both similar to and different from what it means offline. The Spirit Rule says mobile products must help us address our deepest needs, both as individuals and as members of communities. And the Mind Rule explains that businesses that want to succeed in mobile need to continually analyze the user experience and use that data to refine and improve their products. Great mobile products replicate and amplify human behavior and interaction, writes Moatti. They don't replace human relationships; they enhance them. A strategy manual rather than a technical treatise, Mobilized includes case studies from mobile pioneers such as Facebook, Uber, Tinder, WhatsApp, and more. The market is full of how-to books for programming apps, but no works examine what is required for business success in the mobile era. Until now."

Solar Electricity Handbook


Michael Boxwell - 2009
    Assuming no previous knowledge, the book explains how solar panels work, how they can be used and explains the steps you need to take to successfully design and install a solar photovoltaic system from scratch. Accompanying this book is a solar resource website containing lots of useful information, lists of suppliers and on-line solar energy calculators that will simplify the cost analysis and design processes.

A Poem for Every Night of the Year


Allie Esiri - 2016
    The poems - together with introductory paragraphs - have a link to the date on which they appear. Shakespeare celebrates midsummer night, Maya Angelou International Women's Day and Lewis Carroll April Fool's day.Perfect for reading aloud and sharing with all the family, it contains a full spectrum of poetry from familiar favourites to exciting contemporary voices. Alfred, Lord Tennyson, W. B. Yeats, A. A. Milne and Christina Rossetti sit alongside Roger McGough, Carol Ann Duffy and Benjamin Zephaniah.

Python: 3 Manuscripts in 1 book: - Python Programming For Beginners - Python Programming For Intermediates - Python Programming for Advanced


Maurice J. Thompson - 2018
    This Box Set Includes 3 Books: Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓Introduction ✓Understanding Python: A Detailed Background ✓How Python Works ✓Python Glossary ✓How to Download and Install Python ✓Python Programming 101: Interacting With Python in Different Ways ✓How to Write Your First Python Program ✓Variables, Strings, Lists, Tuples, Dictionaries ✓About User-Defined Functions ✓How to Write User-Defined Functions in Python ✓About Coding Style ✓Practice Projects: The Python Projects for Your Practice Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓ Shallow copy and deep copy ✓ Objects and classes in Python–including python inheritance, multiple inheritances, and so on ✓ Recursion in Python ✓ Debugging and testing ✓ Fibonacci sequence (definition) and Memoization in Python in Python ✓ Arguments in Python ✓ Namespaces in Python and Python Modules ✓ Simple Python projects for Intermediates Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓File management ✓Python Iterator ✓Python Generator ✓Regular Expressions ✓Python Closure ✓Python Property ✓Python Assert, and ✓Simple recap projects Start Coding Now!

Routing Tcp/Ip, Volume II (CCIE Professional Development)


Jeff Doyle - 2001
    Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle's practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional's library. Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management.