Book picks similar to
Linux for Beginners and Command Line Kung Fu by Jason Cannon
linux
computers
ebook
bought
The Wrong Abraham (Boston Law #3)
David S. Brody - 2006
Then she receives a baffling letter from her rich Uncle Abraham, a Holocaust survivor: Only she, he mysteriously proclaims, can prevent a major terrorist attack on Boston. Working with Homeland Security, Shelby and her fiancé, Bruce Arrujo, race through the streets of Boston, first attempting to stop a Hiroshima-sized Liquified Natural Gas tanker explosion in Boston Harbor, then fighting to prevent a deadly release of anthrax powder at Fenway Park. Yet the terrorists always seem to be one step ahead of them. Through it all, a question haunts Shelby: Why does Uncle Abraham always seem to be one step ahead of the terrorists?
The Warriors Series Boxset II
Ty Patterson - 2016
Special Forces Operative Zeb Carter. Those who are dying to meet him...get there. These four thrillers are his stories. Over 750 pages of blistering action that readers of Mitch Rapp, Scot Harvath, Pike Logan, Jack Reacher, and Will Robie flock to, More than 50% off on the individual books. Discover why USA Today Bestselling Author Ty Patterson is 'Surely one of the best action writers of the day.' Boxset II, with books 5-8 of the highly acclaimed Warriors series, continues the thrill ride from Boxset I. Boxset II can be read stand-alone. Flay A serial killer is terrorizing New York city -- The Flayer, who kills his victims in the most gruesome manner. He is working to a plan; to break the internet. But that's only part of his plan. The second part will break the city. Behind You They warned Elena Petrova, a journalist, to drop her story. She didn't. They raped her. She didn't give up. They killed her and buried her body where no man could find it. Unfortunately for them, Zeb Carter did. Hunting You You are Hank Parker. Armed intruders break in when you are dining with your family. They ask you a question. Tell a lie and watch them die. Don't Know isn't an option. How will you save your family when even hope has deserted you? Zero Eighteen terrorists. Hundreds of hostages. Three good men, and U.S. Special Forces operative Zeb Carter. Dying can be fatal! 'Surely one of the best action writers of the day.' Gordon, Amazon review. Grab your copy today! Check out the Warriors Series: The Warrior The Reluctant Warrior The Warrior Code The Warrior's Debt Warriors Series Boxset I, Books 1-4 Flay Behind You Hunting You Zero Warriors Series Boxset II, Books 5-8
The Timeless Trilogy Boxed Set, #1-3
Holly Hook - 2015
The mystery of where—or rather when—Julia comes from kept me glued to the page. Once that’s revealed, it’s game on to try and change her fate. I’m impressed with any author that can take on something as complicated as time travel and have it make sense in the end. Holly Hook did so wonderfully."--Amazon Reviewer Seventeen year old Julia just learned that she's in the wrong time. With no memory of where she's from, she must escape the Timeless, a group bent on sending her back home. But home is danger, says mysterious Simon, the hot new guy at school. Home is death. Julia must grow closer to Simon to unravel the truth about where she's from--but doing may be her end. The story continues and concludes in 11:39 and 1500, the second and third books of the Timeless Trilogy.
Essential PHP Security
Chris Shiflett - 2005
It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.
Twist of Fake
Ashlee Price - 2018
The moment I saw those inked arms, I wanted them wrapped around me.One look and he made my engine purr.Yet I kept all those fantasies to myself, never knowing I'd have a chance to make them real.Real? No. All this is pretend.Just a game with the highest stakes:My body and my heart.
Python: The Complete Reference
Martin C. Brown - 2001
This text is split into distinct sections, each concentrating on a core angle of the language. The book also contains sections for Web and application development, the two most popular uses for Python. It is designed to teach a programmer how to use Python by explaining the mechanics of Python. The appendixes offer a quick guide to the main features of the Python language, as well as additional guides to non-essential systems such as the IDLE development environment and general guidelines for migrating from another language.
Microsoft Excel Essential Hints and Tips: Fundamental hints and tips to kick start your Excel skills
Diane Griffiths - 2015
We look at how to set up your spreadsheet, getting data into Excel, formatting your spreadsheet, a bit of display management and how to print and share your spreadsheets. Learn Excel Visually The idea of these short handy bite-size books is to provide you with what I have found to be most useful elements of Excel within my day-to-day work and life. I don’t tell you about all the bells and whistles – just what you need on a daily basis. These eBooks are suitable for anyone who is looking to learn Excel and wants to increase their productivity and efficiency, both at work and home. Please bear in mind I don’t cover all functionality of all areas, the point is that I strip out anything that’s not useful and only highlight the functionality that I believe is useful on a daily basis. Don’t buy a huge textbook which you’ll never fully read, pick an eBook which is most relevant to your current learning, read it, apply it and then get on with your day.
Reinventing Mona
Jennifer Coburn - 2005
That's when the realization hit: I'm young, I'm rich (thanks to a hefty inheritance), and I'm boring. Not "needs a little zip" boring, either. More like "mustard stain on a Sears tweed couch" drab. French's in a squeeze bottle, that's me. But suddenly I have Grey Poupon aspirations! Things are gonna change-starting now...
Building a better mantrap...
First things first: Exercise. Carrot juice. Straight hair. Whiter teeth. Clothes that fit (I have breasts? Who knew?) But wait-there's more. Life's kicked me around a bit, and I've been nursing my wounds for too long. I'm finally ready to take a chance on love with the perfect guy. He's handsome. He's smart. He's reliable. He's my CPA. Problem is, I'm clueless about winning him over. It's time to call in an expert. It's time to call in The Dog.
Down, boy.
Mike "The Dog" Dougherty is a man's man. A guy's guy. Okay, he's a chauvinist pig, and his sty is "The Dog House," a testosterone-charged column in Maximum for Him magazine. On one hand, I abhor all he stands for. On the other hand, who better to coach me? So here I am. Learning the complex unspoken language of the American male (Talk, bad. Sex, good.); trying exciting new things (Stripping lessons are empowering. Really.); falling for Mike. Uh oh. But the Mike I'm getting to know is different from The Dog. And the Mona I'm becoming isn't quite who I expected, either. This whole makeover scheme is getting crazier by the minute. But "crazy" beats "boring"...right? Jennifer Coburn is an award-winning journalist who has written for magazines and newspapers in the United States, Canada and Australia. She lives in San Diego with her husband, William and their daughter, Katie. Jennifer desperately wishes she had Mona's unlimited cash, beachfront estate and singing voice. When she's not living vicariously through chick-lit characters, Jennifer runs a public relations business which serves non-profit organizations and small businesses in southern California. She is also the coordinator of the Del Cerro Soccer Moms League and coach of the real-life Kickin' Chicks, the best seven-year-old girls to ever tear up suburban soccer fields.
Ononokin Book Bundle #1
John P. Logsdon - 2015
At the perpetual age of 650, this is really no longer an option. The Full Moon Event Paulie Vergen is a Vampire living the daily grind of life until a fateful day when a newly infected Werewolf landed on his doorstep. All Paulie wanted was peace and quiet, but life didn't often seem to care about his plans. He's now faced with helping the poor Werewolf navigate through the Underworld in order to find the help that he needs. Bob the Zombie Bob is a Zombie who was just going about his business when a band of thieves stole his hand so that they could make a batch of Elfagra in the Upperworld. While it's bad enough that they've stolen Bob's hand for such a purpose, it comes to the Zombie's attention that if the bad guys use the wrong technique it could cause a cosmic rift that will spell the real death of Bob...not just the long, drawn out one that's part of being a Zombie. Gappy's Gadgets Gappy Whirligig is an industrious Gnome who has yet to reach the Age of Tinkering. In a flash, Gappy's life flips upside down, leaving him to make the decision to either strike out on his own or become a 42-year-old foster child. Gappy demonstrates his industrious spirit as he leaves Hubintegler's rules and regulations behind and instead seeks to make his mark in the seedy town of Planoontik.These stories get their influence from Terry Pratchett's Discworld, Robert Asprin's Myth Adventures, Monty Python, and countless other comedic mediums. This omnibus edition includes the first four books in the Tales from the Land of Ononokin series. You'll get wizards, vampires, werewolves, dwarves, elves, gnomes, orcs, ogres, giants, gorgans, humans, trolls, zombies, and more ... and it's all set in a fantastical world that will keep you giggling for weeks.
10 PRINT CHR$(205.5+RND(1)); : GOTO 10
Nick MontfortMark Sample - 2012
The authors of this collaboratively written book treat code not as merely functional but as a text—in the case of 10 PRINT, a text that appeared in many different printed sources—that yields a story about its making, its purpose, its assumptions, and more. They consider randomness and regularity in computing and art, the maze in culture, the popular BASIC programming language, and the highly influential Commodore 64 computer.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
The Guestbook
Andrea Hurst - 2012
The lush and majestic setting of the Pacific Northwest calls to her and offers a place of refuge and perhaps renewal. Her grandmother has passed away, leaving the Madrona Island Bed & Breakfast Inn to Lily. Left with only an old guestbook as her guide–a curious book full of letters, recipes, and glimpses into her family history–Lily is determined to embrace her newfound independence and recreate herself, one page at a time. With the help of the quirky island residents she has befriended, she slowly finds the strength to seek out happiness on her own terms. But as soon as she has sworn off men and is standing on her own two feet, Lily meets Ian, the alluring artist who lives next door, and her new life is suddenly thrown off course. The last thing she wants to do right now is to open her heart to another man. Ultimately, Lily must decide if it’s worth giving up her soul for security or risking everything to follow her heart.
Wrath of the Sister
Shannon Heuston - 2019
The products of a dysfunctional family, the two have never been close. Then Laurel introduces her to an eligible bachelor with a shady past. Twenty-six years ago his fiancée was found murdered. Has Melody found the man of her dreams, or is she involved with a killer?
What is DevOps?
Mike Loukides - 2012
Old-style system administrators may be disappearing in the face of automation and cloud computing, but operations have become more significant than ever. As this O'Reilly Radar Report explains, we're moving into a more complex arrangement known as "DevOps."Mike Loukides, O'Reilly's VP of Content Strategy, provides an incisive look into this new world of operations, where IT specialists are becoming part of the development team. In an environment with thousands of servers, these specialists now write the code that maintains the infrastructure. Even applications that run in the cloud have to be resilient and fault tolerant, need to be monitored, and must adjust to huge swings in load. That was underscored by Amazon's EBS outage last year.From the discussions at O'Reilly's Velocity Conference, it's evident that many operations specialists are quickly adapting to the DevOps reality. But as a whole, the industry has just scratched the surface. This report tells you why.
The Curse of Wetherley House
Amy Cross - 2017
Even the legend of Evil Mary doesn't put her off. After all, she knows ghosts aren't real. But when Mary makes her first appearance, Rosie realizes she might already be trapped. For more than a century, Wetherley House has been cursed. A horrific encounter on a remote road in the late 1800's has already caused a chain of misery and pain for all those who live at the house. Wetherley House was abandoned long ago, after a terrible discovery in the basement, something has remained undetected within its room. And even the local children know that Evil Mary waits in the house for anyone foolish enough to walk through the front door. Before long, Rosie realizes that her entire life has been defined by the spirit of a woman who died in agony. Can she become the first person to escape Evil Mary, or will she fall victim to the same fate as the house's other occupants?