Book picks similar to
SQL Programmer's Reference by Kishore Bhamidipati
technical
computers
n_i_development
office
Propellerhead
Antony Woodward - 2001
.Woodward’s warm, wry account of learning to fly will lift hearts everywhere. BBC2 documentary based on the book - 30 January 2012. Antony Woodward wasn’t interested in flying, he was interested in his image. So in his world of socialising and serial womanising, a microlight plane sounded like the ideal sex aid. So why – once he discovers that he has no ability as a pilot, it costs a fortune and its maddening unreliability loses him the one girl he really wants – does he get more and more hooked?As he monitors the changes to the others in the syndicate; as he learns that there is a literal down-side to cheating in flying exams, shunning responsibility and pretending to know stuff you don’t, the question keeps on surfacing. Why? As the misadventures mount – accidents, tussles with Tornadoes, arrest by the RAF – he keeps thinking he’s worked it out. But it isn’t until The Crash, in which he nearly kills himself and Dan (taking a short-cut in the Round Britain race) that the penny finally drops….Flying is the antidote to modern life he didn’t even know he needed. It’s the supreme way to feel real.
The Ravine
Robert Pascuzzi - 2014
A short while later, Danny Turner is found in his car at the bottom of a ravine, after having taken his own life. Any explanation as to why a loving father and husband would suddenly commit a series of such heinous crimes has gone to the grave with the accused. The mystery only deepens as the details of the murders emerge, and evidence of premeditation as well as Danny’s hidden past are revealed. Subsequently, Rachel’s closest friend, Carolyn Bianci, sinks into a deep depression, while her husband, Mitch, copes with his despair by attempting to uncover the facts of the crime. Eventually they encounter Joanna Larson, a fascinating woman who possesses extraordinary spiritual gifts. Through Joanna, the truth about the events that took place the night of the murders are unveiled. The answers Mitch and Carloyn get are beyond their human understanding. Inspired by true events, The Ravine is a story of faith, forgiveness, and most of all, the restoration of hope—even for the most seemingly unredeemable among us.
Footballistics
James Coventry - 2018
The nature of football continually changes, which means its analysis must also keep pace. This book is for students, thinkers, and theorists of the game.'Ted Hopkins - Carlton premiership player, author, and co-founder of Champion Data. Australian Rules football has been described as the most data-rich sport on Earth. Every time and everywhere an AFL side takes to the field, it is shadowed by an army of statisticians and number crunchers. The information they gather has become the sport's new language and currency. ABC journalist James Coventry, author of the acclaimed Time and Space, has joined forces with a group of razor-sharp analysts to decipher the data, and to use it to question some of football's long-held truisms. Do umpires really favour the home side? Has goal kicking accuracy deteriorated? Is Geelong the true master of the draft? Are blonds unfairly favoured in Brownlow medal voting? And are Victorians the most passionate fans? Through a blend of entertaining storytelling and expert analysis, this book will answer more questions about footy than you ever thought to ask. Praise for Time and Space:'Brilliant, masterful' - The Guardian'Arguably one of the most important books yet written on Australian Rules football.' - Inside History'Should find its way into the hands of every coach.' - AFL Record
A Year Up: Rediscovering America and the Talent Within
Gerald Chertavian - 2012
In 2000, Chertavian dedicated his life to closing that divide and Year Up was born.Year Up is an intensive program that offers low income young adults training, mentorship, internships, and ultimately real jobs—often with Fortune 500 companies. 85 percent of program graduates are employed or in full-time college within four months of graduation. Today, Year Up serves more than 1,300 students in nine cities across the nation.Following a Year Up class from admissions through graduation, A Year Up lets students share—in their own words—the challenges, failures, and personal successes they’ve experienced during their program year. This deeply moving and inspirational story also explains Chertavian’s philosophy and the program’s genesis, offering a road map for real change in our country and a beacon for young adults who want the opportunity to enter the economic mainstream.
More Eric Meyer on CSS
Eric A. Meyer - 2004
It covers various topics which include converting an HTML-based design to a pure positioning layout; styling a photo gallery; and others.
On Classical Economics
Thomas Sowell - 2006
It is not simply a Cook's tour of colorful personalities of the past but a study of how certain economic concepts and tools of analysis arose, and how their implications were revealed during the controversies that followed. In addition to a general understanding of classical macroeconomics and microeconomics, this book offers special insight into the neglected pioneering work of Sismondi—and why it was neglected—and a detailed look at John Stuart Mill's enigmatic role in the development of economics and the mysteries of Marxian economics.Clear, engaging, and very readable, without being either cute or condescending, On Classical Economics can enable a course on the history of economic thought to make a contribution to students’ understanding of economics in general--whether in price theory, monetary theory, or international trade. In short, it is a book about analysis as well as history.
Lonely Planet Moscow
Leonid Ragozin - 2000
Prepare yourself for a distinctively Russian cauldron of artistry and history, nightclubs and vibrant street life. Mara Vorhees, Lonely Planet Writer Our PromiseYou can trust our travel information because Lonely Planet authors visit the places we write about, each and every edition. We never accept freebies for positive coverage so you can rely on us to tell it like it is.Inside This Book 80 art galleries & museums59 bars and cafes reviewed28 kremlins, cathedrals & palaces11 revamped exhibitions & art spaces2 banyas to get naked & sweat inComprehensive map sectionFeature coverage of top sightsRange of planning toolsIn-depth background on Russian art, architecture & literature
Version Control By Example
Eric Sink - 2011
Topics covered include:Basic version control commands and conceptsIntroduction to Distributed Version Control Systems (DVCS)Advanced branching workflowsStrengths and weaknesses of DVCS vs. centralized toolsBest practicesHow distributed version control works under the hoodFeaturing these open source version control tools:Apache SubversionMercurialGitVeracity
Programming Pearls
Jon L. Bentley - 1986
Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem." - Steve McConnell, author, Code CompleteWhen programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that
Programming Pearls
has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect current programming methods and environments. In addition, there are three new essays on (1) testing, debugging, and timing; (2) set representations; and (3) string problems. All the original programs have been rewritten, and an equal amount of new code has been generated. Implementations of all the programs, in C or C++, are now available on the Web.What remains the same in this new edition is Bentley's focus on the hard core of programming problems and his delivery of workable solutions to those problems. Whether you are new to Bentley's classic or are revisiting his work for some fresh insight, this book is sure to make your own list of favorites.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Security+ Guide to Network Security Fundamentals
Mark Ciampa - 2004
The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
Managing the Software Process
Watts S. Humphrey - 1989
Emphasis is placed on the basic principles and priorities of the software process. Sections are organized in a natural way for managers and professionals to implement improvement activities.
Professional PHP Programming
Sascha Schumann - 1999
PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.
Getting Started with Arduino
Massimo Banzi - 2008
Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.