The Stardust Affair


Bilal Siddiqi - 2017
    

Java Performance: The Definitive Guide


Scott Oaks - 2014
    Multicore machines and 64-bit operating systems are now standard even for casual users, and Java itself has introduced new features to manage applications. The base JVM has kept pace with those developments and offers a very different performance profile in its current versions. By guiding you through this changing landscape, Java Performance: The Definitive Guide helps you gain the best performance from your Java applications.You’ll explore JVM features that traditionally affected performance—including the just-in-time compiler, garbage collection, and language features—before diving in to aspects of Java 7 and 8 designed for maximum performance in today's applications. You’ll learn features such as the G1 garbage collector to maximize your application’s throughput without causing it to pause, and the Java Flight Recorder, which enables you to see application performance details without the need for separate, specialized profiling tools.Whether you’re new to Java and need to understand the basics of tuning the JVM, or a seasoned developer looking to eek out that last 10% of application performance, this is the book you want.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

The Leprechauns of Software Engineering


Laurent Bossavit - 2012
    You can think of this problem as a variant of the well known "telephone game", where some trivial rumor is repeated from one person to the next until it has become distorted beyond recognition and blown up out of all proportion.Unfortunately, the objects of this telephone game are generally considered cornerstone truths of the discipline, to the point that their acceptance now seems to hinder further progress.In this short ebook, we will take a look at some of those "ground truths": the claimed 10x variation in productivity between developers; the "software crisis"; the cost-of-change curve; the "cone of uncertainty"; and more. We'll hone our scholarship skills by looking up the original source for these ideas and taking a deep dive in the history of their development. We'll assess the real weight of the evidence behind these ideas.And we'll confront the scary prospect of moving the state of the art forward in a discipline that has had the ground kicked from under it.

Joel on Software


Joel Spolsky - 2004
    For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.

JavaScript Allongé: A strong cup of functions, objects, combinators, and decorators


Reginald Braithwaite - 2012
    JavaScript Allongé is for:-- Programmers learning JavaScript who want a thorough grounding in its fundamentals rather than a cursory treatment of its syntax.-- Programmers already using JavaScript who want to go back and take a deep dive into programming with functions and combinators.-- Any programmer curious about programming with functions.JavaScript Allongé's primary focus is functions as first-class values and topics built on those fundamentals such as objects, prototypes, "classes," combinators, method decorators, and fluent APIs.

CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide


Darril Gibson - 2017
     It covers all of the SY0-501 objectives and includes the same elements readers raved about in the previous two versions. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of students master the Security+ content. You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important. Over 300 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 75 question pre-test, a 75 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll also have access to free online resources including labs and additional practice test questions. Using all of these resources, you’ll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-501 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http://blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http://learnzapp.com/partners/darrilg....

Age of Context: Mobile, Sensors, Data and the Future of Privacy


Robert Scoble - 2013
    Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we’ll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we’re running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

Manual of Style for Contract Drafting


Kenneth A. Adams - 2008
    Adams has created a uniquely in-depth survey of the building blocks of contract language. First published in 2004, it offers those who draft, review, negotiate, or interpret contracts an alternative to the dysfunction of traditional contract l ... Available here:readbux.com/download?i=1634259645A Manual of Style for Contract Drafting PDF by Kenneth A. AdamsRead A Manual of Style for Contract Drafting PDF from American Bar Association,Kenneth A. AdamsDownload Kenneth A. Adams’s PDF E-book A Manual of Style for Contract Drafting

The Spartan Dagger: A Novel


Nicholas Guild - 2016
    A family--father, mother, and their son--approaches, unarmed and defenseless. The young men step into the moonlight and claim their manhood by killing the adults. The boy escapes.The Spartans have no idea how terrible an enemy they have called forth. Nothing could have prepared them for the boy, Protos, whose name means “destined,” whose cunning and inborn skill with weapons renders his enemies almost defenseless, and whose heart knows no pity. The Spartans have oppressed his people for centuries, and to break their power is to free all those they hold in subjection. As Protos grows to manhood, he begins to understand that his private war against his parents’ murderers is also a struggle for liberation.

Take Back Your Life!: Using Microsoft Office Outlook 2007 to Get Organized and Stay Organized


Sally McGhee - 2007
    Get expert advice and take back control over your life and workday by managing all your communications action items and interactions with proven time management and productivity techniques and Microsoft Office Outlook 2007 In this book productivity expert Sally McGhee shows you how to take control and reclaim something you thought you had lost forever your work life balance Now you can benefit from Sally s popular and highly regarded corporate education programs learning simple but powerful techniques for rebalancing your personal and professional commitments by using the latest productivity features in Microsoft Office Outlook 2007 If you re bogged down by unrelenting e mail messages conflicting commitments and endless interruptions it s not too late to reclaim control of your workday and take back your life By applying the same time management and productivity techniques used by leading companies you can better manage all of your communications action items and interactions In this book productivity expert Sally McGhee shows you how to take control and reclaim something you thought you had lost forever your work life balance Now you can benefit from Sally s popular and highly regarded corporate education programs learning simple but powerful techniques for rebalancing your personal and professional commitments by using the latest productivity features in Microsoft Office Outlook 2007 Learn the proven methods that empower you to clear away distractions and loose ends and focus on what s really important to you and your business You will discover what defines and what limits your personal productivity and learn how to create your own management system Examine how you collect and store information process and organize your e mail messages for efficiency and plan and prioritize with the calendar features in Office Outlook 2007 Learn what thousands of people worldwide have discovered about taking control of their everyday productivity and

13 Hoodoo Jar Spells: Love Money Protection Nightmares Banishing and More


Elizabeth Dupart - 2016
    Each recipe has been tested and perfected by a true practitioner of hoodoo. From finding love to banishing a spirit, you can find it all in this book!

Almost Perfect: How a Bunch of Regular Guys Built WordPerfect Corporation


W.E. Pete Peterson - 1993
    A former executive at the WordPerfect Corporation details the company's rise in the computer industry and what compelled him to leave after ten years as a driving force in the company.

Circle of Greed: The Spectacular Rise and Fall of the Lawyer Who Brought Corporate America to Its Knees


Patrick Dillon - 2010
    For more than two decades, Lerach threatened, shook down and sued top Fortune 500 companies, including Disney, Apple, Time Warner, and--most famously--Enron. Now, the man who brought corporate moguls to their knees has fallen prey to the same corrupt impulses of his enemies, and is paying the price by serving time in federal prison. If there was ever a modern Greek tragedy about a man and his times, about corporate arrogance and illusions and the scorched-earth tactics to not only counteract corporate America but to beat it at its own game, Bill Lerach's story is it.

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.