Book picks similar to
High Performance Cluster Computing: Architectures and Systems, Vol. 1 by Rajkumar Buyya
it-wikipedia
office
possibly-never
qqq
Excel 2007 VBA Programming for Dummies
John Walkenbach - 1996
Packed with plenty of sample programs, it explains how to work with range objects, control program flow, develop custom dialog boxes, create custom toolbars and menus, and much more.Discover how toGrasp essential programming concepts Use the Visual Basic Editor Navigate the new Excel user interface Communicate with your users Deal with errors and bugs
Decoding Communication: A Complete Handbook for Effective Communication
Girish Jain
From day-to-day conversations to professional meetings, from candid talks to consequential discussions, the book explains the nitty-gritty of impactful communication.How to make the best of this book?Go in the chronological order, comprehending each chapter in-depth, and participating in the exercises. Make a note of important points of reference. Practice and rehearse the skills that you learnt. Once you complete all the chapters, following the same method, re-visit previous chapters if required. Involve in the activities suggested and have a real-life experience on showcasing the skills that you learn.
Diary Of An 80s Computer Geek: A Decade of Micro Computers, Video Games & Cassette Tape
Steven Howlett - 2014
The 1980s were certainly loud, often garish and utterly fabulous - no matter how embarrassing the outfits were.There are so many elements, which made the 80s a truly great decade, but one of the greatest contributions, if not the greatest, is the mass introduction of affordable 8-bit home micro computers.These curious machines of geekdom changed the way we regarded computers and technology. No longer were they the sole perverse of tweed jacket clad scientists sporting unruly beards, micro computers were now forming a staple inventory in millions of homes.Much of the technology that we enjoy today, such as desktop computers, notebooks, tablets, gaming consoles and smart phones, all of which are often taken for granted, can be traced back to this innovative decade.If you were a child of the 80s and remember the joy of receiving your very first home computer or maybe a young adult who fondly remembers the excitement, then you will appreciate this unabashed reminiscence of a simpler time whose adolescent technological was on the cusp of great advancements.This book is intended as celebration and reflection of all the computer technology that made the 80s such a wonderful, pioneering period and follows the journey of a self confessed, teenaged computer geek who experienced and enjoyed every ground breaking moment, including publishing his own software.10 Print “The 80s are fab!”20 Goto 10RunAuthor's Comments:The current edition is dated 31st January 2016 and has been edited based on customer feedback.
The Feiner Points of Leadership: The 50 Basic Laws That Will Make People Want to Perform Better for You
Michael Feiner - 2004
Feiner's candid leadership guide cuts through rhetoric and theory and gives managers and executives a "hands-on" approach to dealing with problems in business.
Ethics in Information Technology
George W. Reynolds - 2002
This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.
Katzung & Trevor's Pharmacology Examination & Board Review (Mc Graw Hill Specialty Board Review)
Anthony J. Trevor - 1990
The latest version is far superior, both in content and presentation, to previous versions. I give it my highest recommendation."--"Doody's Review Service"From the authors of "Basic and Clinical Pharmacology," the leading pharmacology textbook, here is the newest edition of the best review book available for medical pharmacology course exams and board examinations. This skill-building guide comes with over 1000 review questions and answers -- far more than most other pharmacology reviews -- and a chapter-based approach that facilitates use with course notes or larger texts. Features: A new full-color presentation Organized to reflect course syllabi, focusing on the clinical use and pharmacology of drug categories, rather than individual drugs Two complete practice exams A valuable appendix of test-taking strategies Chapters that include valuable learning aids such as: --Short discussion of the major concepts that underlie basic principles or drug groups--Explanatory figures and tables--Review questions followed by answers and explanations--Drug Trees in drug-oriented chapters that visually organize drug groups--A list of high-yield terms and definitions you need to know Skill Keeper questions that prompt you to review previous material to understand links between related topics A checklist of tasks you should be able to do, once you have finished the chapter Summary Tables that list the important drugs and include key information about their mechanisms of action, effects, clinical uses, pharmacokinetics, drug interactions, and toxicities
The Irresistible Church
Wayne Cordeiro - 2011
In his signature style, he shares this expertise with pastors, lay leaders, and people in the pew who want to see their churches become more vibrant. The 12 practical steps include ways to help people become part of a community, develop a culture of serving, turn visitors into regular attenders, and much more. This short, easy-to-read book is one pastors will want to share with their leadership team.
The Education of an American Dreamer: How a Son of Greek Immigrants Learned His Way from a Nebraska Diner to Washington, Wall Street, and Beyond
Peter G. Peterson - 2009
Peterson describes his remarkable life story beginning in Kearney, Nebraska as an eight-year-old manning the cash register at his father's Greek diner through his "Mad Men" advertising days, to Secretary of Commerce in Nixon's paranoid White House, to the tumultuous days of Lehman Brothers, and to the creation of The Blackstone Group, one of the great financial enterprises in recent times. In THE EDUCATION OF AN AMERICAN DREAMER, Peterson chronicles the progress of this journey with irony, humor and, sometimes, painful honesty. Within these pages are stories of marriage and family hardship; lessons in political gamesmanship; thoughts on his obsessive desire to succeed; and, finally, learning the meaning of "enough." From his advertising days in Chicago in the 1950's to becoming the youngest CEO of a Fortune 300 Company, he shares with us his rise to the top and the price paid along the way. As the youngest Cabinet member in the Nixon administration, he describes his survival techniques in a hubris-driven and paranoid White House, including his turbulent turf wars with Treasury Secretary John Connally leading to Peterson's abrupt and highly publicized firing. His stewardship of Lehman Brothers is a Shakespearian tale of a CEO who struggled to deal with partners who were plotting his demise and, at the same time, turning an institution on the brink of bankruptcy to one with 5 straight years of record profits. His life's story is about doing well by doing good. In the wake of Blackstone's highly successful public offering, Peterson found himself an 80-year old instant billionaire, on the verge of retirement. And like many lifetime workers and over-achievers, he suddenly confronts an unexpected, depressing identity crisis. His solution? Committing a great bulk of his net proceeds to establish the Peter G. Peterson Foundation, his philanthropic endeavor to do something about America's politically untouchable challenges that threaten America's future, among them massive entitlement obligations, ballooning health care costs, and our energy gluttony.Ultimately, this is a man's account of his legendary successes, humiliating failures, and personal tragedies - a testament to a remarkable life and, indeed, to the American Dream itself.
A Whirlwind Tour of Python
Jake Vanderplas - 2016
This report provides a brief yet comprehensive introduction to Python for engineers, researchers, and data scientists who are already familiar with another programming language.Author Jake VanderPlas, an interdisciplinary research director at the University of Washington, explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.You’ll explore:- Python syntax basics and running Python codeBasic semantics of Python variables, objects, and operators- Built-in simple types and data structures- Control flow statements for executing code blocks conditionally- Methods for creating and using reusable functionsIterators, list comprehensions, and generators- String manipulation and regular expressions- Python’s standard library and third-party modules- Python’s core data science tools- Recommended resources to help you learn more
Real Business of IT: How CIOs Create and Communicate Value
Richard Hunter - 2009
The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization:-Value for money when your IT department operates efficiently and effectively-An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability-Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specializationThe authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is.
Cloud Computing: Concepts, Technology & Architecture
Thomas Erl - 2013
To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services.In Cloud Computing: Concepts, Technology & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions.Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.With more than 260 figures, 29 architectural models, and 20 mechanisms, this indispensable guide provides a comprehensive education of cloud computing essentials that will never leave your side.
Lippincott's Illustrated Reviews: Microbiology
Richard A. HarveyVictor Stollar - 2001
The book has the hallmark features for which Lippincott's Illustrated Reviews volumes are so popular: an outline format, over 600 full-color illustrations, end-of-chapter summaries, review questions, plus an entire section of clinical case studies with full-color illustrations. This edition's medical/clinical focus has been sharpened to provide a high-yield review. Five additional case studies have been included, bringing the total to nineteen. Review questions have been reformatted to comply with USMLE Step 1 style, with clinical vignettes.
Physics for Scientist and Engineers With Modern Physics
Raymond A. Serway - 1990
This bestselling calculus-based introductory physics text for science and engineering students is recognized throughout the world for its clear and logical presentation of the basic concepts and principles of physics. The carefully crafted revision introduces coauthor Robert Beichner and contributing author John W. Jewett, Jr., who bring to the new edition their experience and talent in the area of physics education. The historically strong problem-solving approach has been further enhanced through increased realism in the worked examples and through additional guidance to students in building a systematic, step-by-step approach to solving homework problems. An updated ancillary package including full multimedia support, on-line homework plus a content-rich Web site for instructors and students complements this unsurpassed textbook and is more fully integrated with the text than ever before.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks