Computer Science Illuminated


Nell B. Dale - 2002
    Written By Two Of Today'S Most Respected Computer Science Educators, Nell Dale And John Lewis, The Text Provides A Broad Overview Of The Many Aspects Of The Discipline From A Generic View Point. Separate Program Language Chapters Are Available As Bundle Items For Those Instructors Who Would Like To Explore A Particular Programming Language With Their Students. The Many Layers Of Computing Are Thoroughly Explained Beginning With The Information Layer, Working Through The Hardware, Programming, Operating Systems, Application, And Communication Layers, And Ending With A Discussion On The Limitations Of Computing. Perfect For Introductory Computing And Computer Science Courses, Computer Science Illuminated, Third Edition's Thorough Presentation Of Computing Systems Provides Computer Science Majors With A Solid Foundation For Further Study, And Offers Non-Majors A Comprehensive And Complete Introduction To Computing.

MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements


Dan HolmeMelissa Craft - 2003
    Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only

9-Inch Addiction


Jamila Jasper - 2018
     “I make the rules around here… And you’ll do well to listen to them.” CHUCK My father’s African American CFO thinks she’s my boss. I’ll have her bent over her desk begging for more before she knows what hit her. If anyone finds out about my intentions with her, I’ll be out on street and shipped off back to London. But I can keep a secret… I bet she can too with these come-hither brown eyes that she can’t keep off me. Nobody says no to Chuck Banks. It’s only a matter of time before she’s MINE. IDA My boss thinks I have nothing better to do than look after his son. Chuck Banks is the type of guy that put me off dating forever… He’s arrogant... Demanding… Bossy… And one of the only men on the East Coat who can close a $50 million dollar deal at a 100% success rate. We need him here. I’m keeping my distance, but I have a feeling he’s trying his hardest to get closer. Too close, and the career I’ve worked so hard for will come crumbling around me. I can’t let this happen. This is a naughtier than ever alpha-male interracial romance. These pages are dripping with no-holds-barred lust to keep you reading ’til the end. This is a full-length novel with 50,000+ words of sizzling sexiness, no cheating, and a guaranteed HEA.

Ubuntu: The Beginner's Guide


Jonathan Moeller - 2011
     In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.

Cyberstrike: London


James Barrington - 2020
    7/7/2005: Ben Morgan, a cybersecurity specialist with the Metropolitan police, starts another day at work. It will be the last normal day he ever has.The Present: In Hong Kong, a crime overlord is offered a deal by shadowy agents from Beijing: his life for a new kind of operation in London. Morgan, now a part of an off the books cyber-terrorism prevention unit, must do everything to stop its spread.This is a new kind of war: different goals, tactics, rules, stakes. And Morgan is caught right in the centre... A pulse-pounding thriller rooted in reality, perfect for fans of Frederick Forsyth, Andy McNab and James Deegan.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Business Intelligence for Dummies


Swain Scheps - 2007
    But you've heard at least a dozen definitions of what it is, and heard of at least that many BI tools. Where do you start? Business Intelligence For Dummies makes BI understandable! It takes you step by step through the technologies and the alphabet soup, so you can choose the right technology and implement a successful BI environment. You'll see how the applications and technologies work together to access, analyze, and present data that you can use to make better decisions about your products, customers, competitors, and more.You'll find out how to:Understand the principles and practical elements of BI Determine what your business needs Compare different approaches to BI Build a solid BI architecture and roadmap Design, develop, and deploy your BI plan Relate BI to data warehousing, ERP, CRM, and e-commerce Analyze emerging trends and developing BI tools to see what else may be useful Whether you're the business owner or the person charged with developing and implementing a BI strategy, checking out Business Intelligence For Dummies is a good business decision.

OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

The Newbery Award Library: Island of the Blue Dolphins/the Witch of Blackbird Pond/the Sign of the Beaver/One-Eyed Cat/Dear Me. Henshaw/Boxed Set


Scott O'Dell - 1989
    

Flood


Richard Doyle - 2002
    The country has suffered floods on an unprecedented scale in recent years, but have we seen the worst, an inundation that threatens millions of lives? Doyle’s vision is incontestable, backed up by over twenty-five years of research. Flood is the disaster novel of today.A storm rages over the north of Britain, a troop carrier founders in the Irish Sea, flood indicators go off the scale, the seas are mountainous and a spring tide is about to strike the East Coast. Air sea rescue and military personnel struggle to save lives all down the coast. The worse is yet to come. When the storm reaches the south the two forces of wind and tide will combine and send a huge one-in-a-thousand tidal surge up the Thames.But surely London is safe: the Thames Barrier will save the capital from disaster as it was intended to do? The river is a titanic presence by now, higher than anyone has known it, and the surge thunders towards the Barrier. Scientists begin to talk of the possibility of overtopping. Can fifty feet high gates be overwhelmed by a wave? Then there is an explosion the size of a small Hiroshima: a supertanker is ablaze in the estuary and most of the Essex petrochemical works are going up with it. The Thames catches fire and the wall of fire and water thunders towards Britain’s capital. This is the story of what happens next, and the desperate attempts to save the capital from destruction.

Sold to the Man With the Tin Leg


Philip Serrell - 2006
    How wrong he was. In SOLD TO THE MAN WITH THE TIN LEG Philip describes his extraordinary experiences as a country auctioneer, aided and abetted by some of the most colourful characters Worcestershire has to offer. From dodgy cars to fakes in the saleroom; angry livestock, mangled silverware and tortuous not to mention muddy experiences in local markets and farm sales, Philip has been there, done that and got the hoofprints on his suit to prove it. And of course, there's the return of Big Nige, 'One Bid' Church and Philip's tin-legged boss...

High-Tech Heretic: Reflections of a Computer Contrarian


Clifford Stoll - 1999
    Now, from a Silicon Valley hero and bestselling technology writer comes a pointed critique of the hype surrounding computers and their real benefits, especially in education. In High-Tech Heretic, Clifford Stoll questions the relentless drumbeat for "computer literacy" by educators and the computer industry, particularly since most people just use computers for word processing and games--and computers become outmoded or obsolete much sooner than new textbooks or a good teacher.As one who loves computers as much as he disdains the inflated promises made on their behalf, Stoll offers a commonsense look at how we can make a technological world better suited for people, instead of making people better suited to using machines.

Head Rush Ajax


Brett McLaughlin - 2006
    Asynchronous programming lets you turn your own web sites into smooth, slick, responsive applications that make your users feel like they're back on the information superhighway, not stuck on a dial-up backroad.But who wants to take on next-generation web programming with the last generation's instruction book? You need a learning experience that's as compelling and cutting-edge as the sites you want to design. That's where we come in. With Head Rush Ajax, in no time you'll be writing JavaScript code that fires off asynchronous requests to web servers...and having fun doing it. By the time you've taken your dynamic HTML, XML, JSON, and DOM skills up a few notches, you'll have solved tons of puzzles, figured out how well snowboards sell in Vail, and even watched a boxing match. Sound interesting? Then what are you waiting for? Pick up Head Rush Ajax and learn Ajax and asynchronous programming the right way--the way that sticks.If you've ever read a Head First book, you know what to expect: a visually rich format designed for the way your brain works. Head Rush ramps up the intensity with an even faster look and feel. Have your first working app before you finish Chapter 1, meet up with the nefarious PROJECT: CHAOS stealth team, and even settle the question of the Top 5 Blues CDs of all time. Leave boring, clunky web sites behind with 8-tracks and hot pants--and get going with next-generation web programming."If you thought Ajax was rocket science, this book is for you. Head Rush Ajax puts dynamic, compelling experiences within reach for every web developer." -- Jesse James Garrett, Adaptive Path"A 'technology-meets-reality' book for web pioneers on the cutting edge." -- Valentin Crettaz, CTO, Condris Technologies

Evil Geniuses in a Nutshell


Illiad - 2000
    'Illiad' Frazer. " Some say it's a cartoon about Open Source; some say it's about the rift between technical and nontechnical staff; others say its about the pain that technical people suffer when dealing with the stubbornly unintelligent; some even say that User Friendly is a cartoon about Internet Workers. User Friendly addresses all those issues, but I don't think that's what it's about, strictly speaking. User Friendly's universe revolves around the simple idea that technology brings out both the best and the worst in people, no matter who they are."User Friendly reads like Dilbert for the Open Source community. With a massive online following, it provides outsiders a light-hearted look at the world of the hard core geek, and allows those who make their living dwelling in this world a chance to laugh at themselves.

Mastering Emacs


Mickey Petersen - 2015
    In the Mastering Emacs ebook you will learn the answers to all the concepts that take weeks, months or even years to truly learn, all in one place.“Emacs is such a hard editor to learn”But why is it so hard to learn? As it turns out, it's almost always the same handful of issues that everyone faces.If you have tried to learn Emacs you will have struggled with the same problems everyone faces, and few tutorials to see you through it.I have dedicated the first half of the book to explaining the essence of Emacs — and in doing so, how to overcome these issues:Memorizing Emacs’s keys: You will learn Emacs one key at a time, starting with the arrow keys. To feel productive in Emacs, it’s important you start on an equal footing — without too many new concepts and keys to memorize. Each chapter will introduce more keys and concepts so you can learn at your own pace. Discovering new modes and features: Emacs is a self-documenting editor, and I will teach you how to use the apropos, info, and describe system to discover new modes and features, or help you find things you forgot! Customizing Emacs: You don’t have to learn Emacs Lisp to alter a lot of Emacs’s functionality. Most changes you want to make are possible using Emacs’s Customize interface and I will show you how to use it efficiently. Understanding the terminology: Emacs is so old it predates almost every other editor and all modern user interfaces. I have an entire chapter dedicated to the unique terminology in Emacs; how it is different from other editors, and what that means to you.