Breaking Bard: Serenade


A.J. Wiseman - 2018
     Darren is homeless when he’s offered the deal of a lifetime: get paid to play a bard in an online, virtual reality game. The catch? He’s tasked with awakening Angelica, a crippled girl who’s spent ten years in the game. As he embarks on his search for her, Darren goes on adventures, learns the lore of the land, and finds that being a bard is more fun than it seemed. But appearances can deceive—especially in a VR world—and Darren is taken aback to discover the girl he’s been assigned to track may not even be the right one. When he finds not one but three girls who fit the bill for Angelica, Darren is forced to stretch his talents and skills to investigate them all, thrusting himself into the midst of warring players, corrupted guilds and forgotten lore. As secrets bubble to the surface and chaos looms, Darren’s investigation puts the girls under threat, and he’s forced to decide where his loyalties lie. Can he uncover the truth and save them before it’s too late? And more importantly… does he have what it takes to be a Bard? Read Breaking Bard: Serenade now and immerse yourself in a LitRPG adventure with sexy goodness and a wily hero who doesn’t quite know what he’s gotten himself into. Warning: Contains graphic violence, revenge, swear words, conspiracies, harassment, forbidden gods, gratuitous sex, and elements of polyamory/harem. If any of these is not your thing, this book is not for you.

Night of the Hunter


Rick Jones - 2016
    When he returns stateside to begin life anew, he quickly finds himself caught up in a scandal involving the appropriation of documents for an undetectable state-of-the-art ICBM by the Islamic State. But what if Jon Jericho discovers something different? What if he learns that the plans were appropriated by American and Israeli intelligence, and then proffered to the Islamic State? As Jericho digs deeper he quickly draws the attention of certain CIA principals. So when a CIA paramilitary group gives chase to terminate Jericho with extreme prejudice to keep the conspiracy safe, the Hunter must utilize his special skill set not only to survive, but to bring forward the hidden truth before the world erupts into global war.

Bittersweet: A short story collection plus extract of new novel Christmas at the Beach Hut


Veronica Henry - 2018
    From forgotten loves to second chances, new happiness and old friends, this is an uplifting and moving collection of short stories about how love changes, and how it changes us - from Sunday Times bestseller Veronica Henry. Your favourite authors love Veronica's gorgeous storytelling: 'Fills your heart with joy and leaves you with a big fat smile on your face' Milly Johnson on Christmas at the Beach Hut 'Truly blissful escapism' Lucy Diamond on A Family Recipe 'A delight from start to finish' Jill Mansell on The Forever House - - - - - ** This is a collection of short stories **

Scar Tissue


David Skivington - 2013
    Transported to a dingy basement in Kolkata to identify the body of her murdered husband she has no explanation for his presence in India. As she searches for answers about who the man she married really was she finds his death surrounded by allegations of drug smuggling, child trafficking and murder. Unsure of what is true and who she can trust, Rachel has no idea of the danger her husband's hidden life has put her in.

Dynamics of Software Development


Jim McCarthy - 1995
    McCarthy is a software industry veteran and the director of the Microsoft Visual C++ development group.

617 Squadron: The Dambusters at War (Memoirs from World War Two)


Tom Bennett - 1986
    

Basic Category Theory for Computer Scientists


Benjamin C. Pierce - 1991
    Assuming a minimum of mathematical preparation, Basic Category Theory for Computer Scientists provides a straightforward presentation of the basic constructions and terminology of category theory, including limits, functors, natural transformations, adjoints, and cartesian closed categories. Four case studies illustrate applications of category theory to programming language design, semantics, and the solution of recursive domain equations. A brief literature survey offers suggestions for further study in more advanced texts.

Mac OS X Internals: A Systems Approach


Amit Singh - 2006
    Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.

The Godfather Papers and Other Confessions


Mario Puzo - 1972
    

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Foundations of Statistical Natural Language Processing


Christopher D. Manning - 1999
    This foundational text is the first comprehensive introduction to statistical natural language processing (NLP) to appear. The book contains all the theory and algorithms needed for building NLP tools. It provides broad but rigorous coverage of mathematical and linguistic foundations, as well as detailed discussion of statistical methods, allowing students and researchers to construct their own implementations. The book covers collocation finding, word sense disambiguation, probabilistic parsing, information retrieval, and other applications.

Conceptual Mathematics: A First Introduction to Categories


F. William Lawvere - 1997
    Written by two of the best-known names in categorical logic, Conceptual Mathematics is the first book to apply categories to the most elementary mathematics. It thus serves two purposes: first, to provide a key to mathematics for the general reader or beginning student; and second, to furnish an easy introduction to categories for computer scientists, logicians, physicists, and linguists who want to gain some familiarity with the categorical method without initially committing themselves to extended study.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Ubuntu: The Beginner's Guide


Jonathan Moeller - 2011
     In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.

True Crime Stories Volume 2: 12 Terrifying True Crime Murder Cases (List of Twelve)


Ryan Becker - 2017
     From Blaine Norris and Ryan Trimble, who conspired to commit bloody murder for the sake of a film, to James Edward Pough who became a mass shooter after his car was repossessed, it is a frightening yet fascinating look at the sometimes-trivial things which set people onto a path of brutal killing and terror. Each one made their darkest fantasies into a reality when they made the decision to kill and each one has earned their own terrible place in this gruesome hall of fame. Get a copy of List of Twelve: Volume 2 and be prepared for an insight into the darkest recesses of dangerous minds like no other book before it.