The Imposter's Handbook


Rob Conery - 2016
    New languages, new frameworks, new ways of doing things - a constant struggle just to stay current in the industry. This left no time to learn the foundational concepts and skills that come with a degree in Computer Science.

The Cauldron


Richard Townshend Bickers - 1999
     World War Two is at its height. A formidable flyer and outstanding marksman, at twenty Charles Hubbard stands out amongst his comrades. Shooting down an enemy aircraft before even being sent to France, he quickly gains a reputation as an Ace before being himself shot down. Returning to England as the Nazi push continues, Hubbard continues to gain renown as he becomes embroiled in the Battle of Britain before being posted to North Africa. Soon he finds himself fighting a very different war to the one he is used to, a war not just against the Germans and Italians but against the desert itself. In an area known simply as The Cauldron, Hubbard’s bravery and moral stamina are pushed to the very limit time and again. Teetering on the verge of breakdown, his men are looking up to him to lead them on towards victory. Hubbard does not know if he has the strength left within himself to rise up once more and overcome his fears… ‘The Cauldron’ is a thrilling World War Two adventure from Richard Townshend Bickers. Praise for Richard Townshend Bickers: ‘A valuable history of the air war that began it all… by an ex-flyer of the Second World War who has a genuine feeling for the feats of his predecessors’ - THE BIRMINGHAM POST ‘His sympathy with the fighting man (and woman) shines out of every page’ - LIVERPOOL DAILY POST Richard Townshend Bickers volunteered for the RAF on the outbreak of the second world war and served, with a Permanent Commission, for eighteen years. He wrote a range of military fiction and non-fiction books, including ‘Torpedo Attack’, ‘My Enemy Came Nigh’, ‘Bombing Run’ and ‘Summer of No Surrender’. Endeavour Press is the UK's leading independent digital publisher. For more information on our titles please sign up to our newsletter at www.endeavourpress.com. Each week you will receive updates on free and discounted ebooks. Follow us on Twitter: @EndeavourPress and on Facebook via http://on.fb.me/1HweQV7. We are always interested in hearing from our readers. Endeavour Press believes that the future is now.

Triathlon: The Beginners Guide: Finish your first triathlon; training tips and racing secrets to make you a faster triathlete


Terry Stevennson - 2015
    Are you thinking about getting into triathlon or attempting your first race? Maybe you’re curious about this whole “Triathlon” thing and want to know if its right for you?If you've ever thought about doing a triathlon, you’re in the right place . Triathlon: the Beginners Guide Will Be Your Trusted Guide Triathlon can be confusing.  Let me help you get started. Don’t be intimidated by skinny 20-somethings squeezed into lycra. Don’t rush into dangerous amounts of joint-pounding training; risking your health. Don’t be fooled into buying tons of expensive and unnecessary equipment. The Beginners Guide will act as your road-map to Triathlon success It covers every aspect of your triathlon, including: which Triathlon distance is right for you how to swim and get over the fear of swimming in open-water, away from the safety and familiarity of your local pool. becoming a fast (and safe) cyclist, without spending thousands of dollars on a professional-grade bike how to run after you’ve just finished an intense bike ride what to look for in a triathlon training plan, and how to tell if you should tear yours up on the spot what you need to eat and drink; before, during and after your race how to put it all together in the intense “transition area” and how to survive race day nerves and the complex logistics of a triathlon race site. I’ll Also Reveal these Nuggets of Triathlon Gold; Earned from Over 25 Years of Triathlon the same “Six Periods of Training” I use with my $1000 per month one-on-one students the simple truth about structuring your Triathlon training . . . no math formula or science PhD required why “standard” advice about open-water swimming will leave you gasping for air while others swim over the top of you the most powerful cure for fear of swimming ever known . . . and why it’s easier to fix than you’ve ever thought possible the single little-known secret of triathlon training to dramatically reduce your risk of injury . . . by up to as much as 90% the only list you’ll ever need for all your Triathlon planning why most Triathlon coaches are 100% wrong in the way they approach race day how to avoid the embarrassing mistakes even veteran triathletes make on race day Start Your Triathlon Journey Today Triathlons the Beginners Guide is everything a new triathl

Getting MEAN with Mongo, Express, Angular, and Node


Simon Holmes - 2015
    You'll systematically discover each technology in the MEAN stack as you build up an application one layer at a time, just as you'd do in a real project.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyTraditional web dev stacks use a different programming language in every layer, resulting in a complex mashup of code and frameworks. Together, the MongoDB database, the Express and AngularJS frameworks, and Node.js constitute the MEAN stack--a powerful platform that uses only one language, top to bottom: JavaScript. Developers and businesses love it because it's scalable and cost-effective. End users love it because the apps created with it are fast and responsive. It's a win-win-win!About the BookGetting MEAN with Mongo, Express, Angular, and Node teaches you how to develop web applications using the MEAN stack. First, you'll create the skeleton of a static site in Express and Node, and then push it up to a live web server. Next, you'll add a MongoDB database and build an API before using Angular to handle data manipulation and application logic in the browser. Finally you'll add an authentication system to the application, using the whole stack. When you finish, you'll have all the skills you need to build a dynamic data-driven web application.What's InsideFull-stack development using JavaScriptResponsive web techniquesEverything you need to get started with MEANBest practices for efficiency and reusabilityAbout the ReaderReaders should have some web development experience. This book is based on MongoDB 2, Express 4, Angular 1, and Node.js 4.About the AuthorSimon Holmes has been a full-stack developer since the late 1990s and runs Full Stack Training Ltd.Table of ContentsPART 1 SETTING THE BASELINEIntroducing full-stack developmentDesigning a MEAN stack architecturePART 2 BUILDING A NODE WEB APPLICATIONCreating and setting up a MEAN projectBuilding a static site with Node and ExpressBuilding a data model with MongoDB and MongooseWriting a REST API: Exposing the MongoDB database to the applicationConsuming a REST API: Using an API from inside ExpressPART 3 ADDING A DYNAMIC FRONT END WITH ANGULARAdding Angular components to an Express applicationBuilding a single-page application with Angular: FoundationsBuilding an SPA with Angular: The next levelPART 4 MANAGING AUTHENTICATION AND USER SESSIONSAuthenticating users, managing sessions, and securing APIsAPPENDIXESInstalling the stackInstalling and preparing the supporting castDealing with all of the viewsReintroducing JavaScript - available online only

A Book on C: Programming in C


Al Kelley - 1984
    It includes a complete chapter on C++ and an overall organization designed to appeal to the many programmers who view C as a stepping stone to C++ and the object-oriented paradigm. This edition also features an increased emphasis on modules and ADTs, which are essential concepts for creating reusable code and which show how to use header files to tie together a multi-file program. computer science students.

Introducing Windows 8.1 for It Professionals


Ed Bott - 2013
    It is offered for sale in print format as a convenience.Get a head start evaluating Windows 8.1 - with early technical insights from award-winning journalist and Windows expert Ed Bott. Based on the Windows 8.1 Preview release, this guide introduces new features and capabilities, with scenario-based advice on how Windows 8.1 can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Preview new features and enhancements, including:How features compare to Windows 7 and Windows XP The Windows 8.1 user experience Deployment Security features Internet Explorer 11 Delivering Windows apps Recovery options Networking and remote access Managing mobile devices Virtualization Windows RT 8.1

Microsoft .NET - Architecting Applications for the Enterprise


Dino Esposito - 2014
    But the principles and practices of software architecting–what the authors call the “science of hard decisions”–have been evolving for cloud, mobile, and other shifts. Now fully revised and updated, this book shares the knowledge and real-world perspectives that enable you to design for success–and deliver more successful solutions. In this fully updated Second Edition, you will: Learn how only a deep understanding of domain can lead to appropriate architecture Examine domain-driven design in both theory and implementation Shift your approach to code first, model later–including multilayer architecture Capture the benefits of prioritizing software maintainability See how readability, testability, and extensibility lead to code quality Take a user experience (UX) first approach, rather than designing for data Review patterns for organizing business logic Use event sourcing and CQRS together to model complex business domains more effectively Delve inside the persistence layer, including patterns and implementation.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Book of Enoch: All About the Three Books of Enoch


Ann Nyland - 2014
    Nyland's translation is called, "Complete Books of Enoch: All Three: New Translation with Extensive Commentary." The mysterious figure of Enoch was the great grandfather of Noah, and an extract from the First Book of Enoch appears in the book of Jude in the New Testament. The First Book of Enoch has been a most controversial book for centuries. The Book of Enoch is of importance to those interested in theology, and controversial knowledge as well as angelology and demonology. Book of Enoch: All About the Three Books of Enoch is by #1 bestselling author and translator Dr. A. Nyland, translator of the Complete Books of Enoch: All Three: New Translation with Extensive Commentary. ABOUT THE AUTHOR. Best selling author and translator Dr. A. Nyland is an ancient language scholar who served as Faculty at the University of New England, Australia. Dr. Nyland is also the translator of "The Book of Jubilees," and "The Gospel of Thomas," and the author of "Angels, Archangels and Angel Categories: What the Ancients said," "Satan: Fiction not Fact. Evidence from the Bible," and "Fallen Angels, Watchers, Giants, Nephilim and Evil," among others.

The Francine Rivers Historical Collection: The Scarlet Thread / The Last Sin Eater


Francine Rivers - 2016
    . . until they fall into the arms of the One who loves them unconditionally. Sierra Madrid’s life has just been turned upside down when she discovers the handcrafted quilt and journal of her ancestor Mary Kathryn McMurray, a young woman who was uprooted from her home only to endure harsh conditions on the Oregon Trail. Though the women are separated by time and circumstance, Sierra discovers that many of the issues they face are remarkably similar. By following Mary Kathryn’s example, Sierra learns to surrender to God’s sovereignty and unconditional love.The Last Sin Eater:A captivating tale of suffering, seeking, and redemption set in Appalachia in the 1850s, The Last Sin Eater is the story of a community committed to its myth of a human “sin eater,” who absolves the dead of their sins, and the ten-year-old child who shows them the Truth. All that matters for young Cadi Forbes is finding the one man who can set her free from the sin that plagues her, the sin that has stolen her mother’s love from her and made her wish she could flee life and its terrible injustice. But Cadi doesn’t know that the “sin eater” is seeking as well. Before their journeys are over, Cadi and the sin eater must face themselves, each other, and the One who will demand everything from them in exchange for the answers they seek.

How To Get to the Top of Google (November 2012 Edition - Updated for Penguin & Panda)


Tim Kitchen - 2012
    You will learn:- How to get your website on the first page of Google- How to get your website showing up multiple times on the first page (one of my websites shows up 6 in the first 7 results!!)- The 3 'Dirty Secrets' that expensive SEO (Search Engine Optimisation) Experts don't want you to know- What you can do for the price of 2 ½ cups of coffee that could have your website ranking top in as little as a day (I have done exactly this and I’ll show you how)- The small things you can do to make a BIG difference- How to analyse your online competition and find their weaknesses- How to pull off the famous ‘Google Leapfrog’- What the recent Google changes mean for people using pre-April 2012 strategies – and it’s not good news!- How to make people click on your website even if it shows up below your competitors!- How to avoid the deadly mistakes that can lead to Google removing your site from the listings- How to survive and thrive post-PenguinWhat most people don't understand is that once you know what to do, it's actually extremely straightforward to rank highly in Google. But there's a lot of misinformation and misunderstanding out there.Tim Kitchen is a Search Engine ranking expert and online business owner currently personally in charge of SEO for over 50 businesses as well as his own businesses in some incredibly competitive markets. He also regularly teaches SEO to more than 2,000 small business owners through his books, courses and videos.In this updated version of the book he shares everything he has learnt from the past 7 years of getting websites to the top of Google.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Learning React: A Hands-On Guide to Building Maintainable, High-Performing Web Application User Interfaces Using the React JavaScript Library


Kirupa Chinnathambi - 2016
    

IBM PC Assembly Language and Programming


Peter Abel - 1987
    Coverage starts from scratch, discussing the simpler aspects of the hardware, and the language, then introduces technical details and instructions as they are needed.

Real World Java EE Patterns--Rethinking Best Practices


Adam Bien - 2009
    :-)