Harry Truman: The Man Who Divided the World


Jack Steinberg - 2016
    Born and raised by poor, struggling farmers in America's heartland, he had become President through his integrity, a little bit of luck, and sheer hard work. He became the leader of the United States at the tail end of the world's deadliest conflict. Thrust into the middle of a world of conflicting ideologies, Truman would be faced with the newest threat to international stability: a ravenous Soviet Union ready to devour the world with its communist philosophies. As the nation's leader, it fell to him to decide the path which the United States would take into the future. A dedicated public servant and a lover of the freedoms guaranteed by the United States Constitution, Truman realized it was not only his duty but his responsibility to safeguard the free world. By pledging to protect the people of the world from totalitarian rule, Truman unintentionally triggered the Cold War. With his pledge, this often overlooked President forever reshaped American foreign policy, dividing the world into East and West for over forty years.

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

DOS For Dummies 3e


Dan Gookin - 1991
    His clear explanations and down-to-earth style make exploring this operating system painless -- even fun! With complete coverage of all versions of DOS, as well as DOS under Windows 98, DOS For Dummies, 3rd Edition (the latest edition of this best-selling guide), offers frustrated DOS users more help than ever before. Inside, find helpful advice on how to Graps the facts and features of MS-DOS in Windows 98 Share data between DOS programs and Windows -- easily Find that lost file and retrieve your program if it crashes Handle error messages in DOS -- without panicking Work with all versions of DOS Discover more about modems and DOS utilities Understand complex terminology with clear explanations in a glossary of terms Run programs directly from the DOS prompt

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying


Lance Henderson - 2015
    So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: - Browse the Internet Anonymously - Darkcoins, Darknet Marketplaces & Opsec Requirements - Tor Hidden Servers - How to Not Get Caught - Counter-Forensics the FBI Doesn't Want You to Know About - Windows vs. Linux - Which Offers Stronger Network Security? - Cryptocurrency (Real Bitcoin Anonymity) - Supercookies & Encryption - Preventing Marketers and Debt Collectors From Finding You - How to Protect Your Assets - i.e., How to Be Invisible and even Hide from the Internet itself! - Darknet Personas Scroll back up and click "Look Inside" and Secure Your Future Today!

Android Application Development for Dummies


Donn Felker - 2010
    The open nature of the Android OS offers programmers the freedom to access the platform's capabilities and this straightforward guide walks you through the steps for creating amazing Android applications. Android programming expert Donn Felker explains how to download the SDK, get Eclipse up and running, code Android applications, and submit your finished products to the Android Market. Featuring two sample programs, this introductory book explores everything from the simple basics to more advanced aspects of the Android platform.Takes you soup through nuts of developing applications for the Android platform Begins with downloading the SDK, then explains how to code Android applications and submit projects to the Android Market Written by Android guru Donn Felker, who breaks every aspect of developing applications for the Android platform into easily digestible pieces No matter your level of programming experience, Android Application Development For Dummies is an ideal guide for getting started with developing applications for the Android platform.

Questions That Sell: The Powerful Process for Discovering What Your Customer Really Wants


Paul Cherry - 2006
    Most salespeople have extensive knowledge of their products, but many fail to ask the questions that will help them uncover the real needs of their customers. Questions That Sell helps readers use advanced questioning techniques to sell their products based on value to the customer, not on price -- and increase their success rate as a result. The book contains powerful examples, exercises, and hundreds of sample questions, including: * Vision Questions: Tap into a customers' needs and desires for the future * Questions to Uncover Problems: Fix something that's not working for the client * Pay-Off Questions: Get customers to articulate for themselves how much the product or service is worth Questions That Sell is an invaluable resource for connecting with customers, understanding what they need, and closing more sales, faster.

The Battle of the Bismarck Sea


Lawrence Cortesi - 2017
    This is the story of the men on both sides who fought the Battle of the Bismarck Sea. Filled with blasting action, this is a novel of desperate men locked in a savage battle for mastery of the world’s greatest ocean. This was a war without rules or mercy, and one that ended in utter annihilation…

Learning Ruby


Michael J. Fitzgerald - 2007
    Written for both experienced and new programmers alike, Learning Ruby is a just-get-in-and-drive book -- a hands-on tutorial that offers lots of Ruby programs and lets you know how and why they work, just enough to get you rolling down the road. Interest in Ruby stems from the popularity of Rails, the web development framework that's attracting new devotees and refugees from Java and PHP. But there are plenty of other uses for this versatile language. The best way to learn is to just try the code! You'll find examples on nearly every page of this book that you can imitate and hack. Briefly, this book:Outlines many of the most important features of Ruby Demonstrates how to use conditionals, and how to manipulate strings in Ruby. Includes a section on regular expressions Describes how to use operators, basic math, functions from the Math module, rational numbers, etc. Talks you through Ruby arrays, and demonstrates hashes in detail Explains how to process files with Ruby Discusses Ruby classes and modules (mixins) in detail, including a brief introduction to object-oriented programming (OOP) Introduces processing XML, the Tk toolkit, RubyGems, reflection, RDoc, embedded Ruby, metaprogramming, exception handling, and other topics Acquaints you with some of the essentials of Rails, and includes a short Rails tutorial. Each chapter concludes with a set of review questions, and appendices provide you with a glossary of terms related to Ruby programming, plus reference material from the book in one convenient location. If you want to take Ruby out for a drive, Learning Ruby holds the keys.

Stop Staring: Facial Modeling and Animation Done Right


Jason Osipa - 2003
    You'll learn the basics of design, modeling, rigging, and animation-while mastering exciting new techniques for stretch-and-squash deformation, advanced blend extraction, and the latest software tools. Walk through the author's detailed analysis of sample animations and discover how to add nuance and sophistication to your designs.Full of insights drawn from years of professional experience, this book provides the focused and practical information you need to create believable facial animations. Learn visimes and lip sync techniques Construct a mouth and mouth keys Explore the process of facial landmarking Master the cartoon techniques of squash and stretch Harness the latest advanced blend extraction tools Create interfaces for your faces Understand skeletal setup, weighting, and rigging Control faces with the book's powerful rig and learn how skin moves to make various shapes and expressionsMaster powerful stretch-and-squash (and squoosh!) techniquesFeatured on the CDFine-tune your facial animations with the techniques demonstrated on the companion CD. Content includes tutorial files, lip sync samples, models, textures, and more.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Embedded Android: Porting, Extending, and Customizing


Karim Yaghmour - 2011
    You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.

So Big the Land


Sue Grocke - 2019
    With little prelude she is thrown into the deep end of a gritty farming life in a man's world. A life of hard work on untamed lands, a two year odyssey through the outback, and months spent in a remote Aboriginal community, reveal to Sue the very character of the Australian landscape. This is the story of one woman's metamorphosis, from timid, imaginative child to resilient, worldly woman - a profound journey of self discovery through tragedy, unfettered and often life-threatening adventure, and overwhelming joy.

Tragedies of Cañon Blanco: A Story of the Texas Panhandle (1919)


Robert Goldthwaite Carter - 1919
    Carter would participate in a number of expeditions against the Comanche and other tribes in the Texas-area. It was during one of these campaigns that he was brevetted first lieutenant and awarded the Medal of Honor for his "most distinguished gallantry" against the Comanche in Blanco Canyon on a tributary of the Brazos River on October 10, 1871. He became a successful author in his later years writing several books based on his military career, including On the Border with Mackenzie (1935), as well as a series of booklets detailing his years as an Indian fighter on the Texas frontier. Carter writes: "IT IS nearly fifty years since these tragedies occurred. There are few survivors. The writer is, perhaps, the only one. This is written in the vague hope that this chronicle of the events of that period may possibly prove of some lasting and, perhaps, historical value to posterity. "The country all about the scene of these tragical events—the Texas Panhandle—was then wild, unsettled, covered with sage brush, scrub oak and chaparral, and its only inhabitants were Indians, buffalo, lobo wolves, coyotes, jack-rabbits, prairie-dogs and rattlesnakes, with here and there a few scattered herds of antelope. The railroad, that great civilizing agency, the telegraph, the telephone, and the many other marvelous inventions of man, have wrought such a wonderful transformation in our great western country that the American Indian will, if he has not already, become a race of the past, and history alone will record the remarkable deeds and strange career of an almost extinct people. With these miraculous changes has come the total extermination of the buffalo—the Indians' migratory companion and source of living—and pretty much all of the wild game that in almost countless numbers freely roamed those vast prairies. Where now the railroads girdle that country the nomadic redman lived his free and careless life and the bison thrived and roamed undisturbed at that period— where are now the appliances of modern civilization, and prosperous communities, then nothing but desolation reigned for many miles around. "In the expansion and peopling of this vast country, our little Army was most closely identified. In fact, it was the pioneer of civilization. The life was full of danger, hardships, privations, and sacrifices, little known or appreciated by the present generation. "Where populous towns, ranches and well-tilled farms, grain fields, orchards, and oil "gushers" are now located, with railroads either running through or near them, we were making trails, upon which the main roads now run, in search of hostile savages, for the purpose of punishing them or compelling them to go into the Indian reservations, and to permit the settlers, then held back by the murderous acts of these redskins, to advance and spread the civilization of the white man throughout the western tiers of counties in that far-off western panhandle of Texas."

Python Programming for Beginners: An Introduction to the Python Computer Language and Computer Programming (Python, Python 3, Python Tutorial)


Jason Cannon - 2014
    There can be so much information available that you can't even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren't explained. This kind of experience is frustrating and leaves you with more questions than answers.Python Programming for Beginners doesn't make any assumptions about your background or knowledge of Python or computer programming. You need no prior knowledge to benefit from this book. You will be guided step by step using a logical and systematic approach. As new concepts, commands, or jargon are encountered they are explained in plain language, making it easy for anyone to understand. Here is what you will learn by reading Python Programming for Beginners: When to use Python 2 and when to use Python 3. How to install Python on Windows, Mac, and Linux. Screenshots included. How to prepare your computer for programming in Python. The various ways to run a Python program on Windows, Mac, and Linux. Suggested text editors and integrated development environments to use when coding in Python. How to work with various data types including strings, lists, tuples, dictionaries, booleans, and more. What variables are and when to use them. How to perform mathematical operations using Python. How to capture input from a user. Ways to control the flow of your programs. The importance of white space in Python. How to organize your Python programs -- Learn what goes where. What modules are, when you should use them, and how to create your own. How to define and use functions. Important built-in Python functions that you'll use often. How to read from and write to files. The difference between binary and text files. Various ways of getting help and find Python documentation. Much more... Every single code example in the book is available to download, providing you with all the Python code you need at your fingertips! Scroll up, click the Buy Now With 1 Click button and get started learning Python today!

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.