Book picks similar to
Building Virtual Machine Labs: A Hands-On Guide by Tony Robinson
cyber
free
rack_025
technology
Head Rush Ajax
Brett McLaughlin - 2006
Asynchronous programming lets you turn your own web sites into smooth, slick, responsive applications that make your users feel like they're back on the information superhighway, not stuck on a dial-up backroad.But who wants to take on next-generation web programming with the last generation's instruction book? You need a learning experience that's as compelling and cutting-edge as the sites you want to design. That's where we come in. With Head Rush Ajax, in no time you'll be writing JavaScript code that fires off asynchronous requests to web servers...and having fun doing it. By the time you've taken your dynamic HTML, XML, JSON, and DOM skills up a few notches, you'll have solved tons of puzzles, figured out how well snowboards sell in Vail, and even watched a boxing match. Sound interesting? Then what are you waiting for? Pick up Head Rush Ajax and learn Ajax and asynchronous programming the right way--the way that sticks.If you've ever read a Head First book, you know what to expect: a visually rich format designed for the way your brain works. Head Rush ramps up the intensity with an even faster look and feel. Have your first working app before you finish Chapter 1, meet up with the nefarious PROJECT: CHAOS stealth team, and even settle the question of the Top 5 Blues CDs of all time. Leave boring, clunky web sites behind with 8-tracks and hot pants--and get going with next-generation web programming."If you thought Ajax was rocket science, this book is for you. Head Rush Ajax puts dynamic, compelling experiences within reach for every web developer." -- Jesse James Garrett, Adaptive Path"A 'technology-meets-reality' book for web pioneers on the cutting edge." -- Valentin Crettaz, CTO, Condris Technologies
Big Data Now: 2012 Edition
O'Reilly Media Inc. - 2012
It's not just a technical book or just a businessguide. Data is ubiquitous and it doesn't pay much attention toborders, so we've calibrated our coverage to follow it wherever itgoes.In the first edition of Big Data Now, the O'Reilly team tracked thebirth and early development of data tools and data science. Now, withthis second edition, we're seeing what happens when big data grows up:how it's being applied, where it's playing a role, and theconsequences -- good and bad alike -- of data's ascendance.We've organized the second edition of Big Data Now into five areas:Getting Up to Speed With Big Data -- Essential information on thestructures and definitions of big data.Big Data Tools, Techniques, and Strategies -- Expert guidance forturning big data theories into big data products.The Application of Big Data -- Examples of big data in action,including a look at the downside of data.What to Watch for in Big Data -- Thoughts on how big data will evolveand the role it will play across industries and domains.Big Data and Health Care -- A special section exploring thepossibilities that arise when data and health care come together.
Marketplace 3.0: Rewriting the Rules of Borderless Business
Hiroshi Mikitani - 2013
And that evolution has huge implications for everything we see, buy and do online. Rejecting the zero-sum, vending-machine model of ecommerce practiced by other leading internet retailers, who view the Internet purely as a facilitator of speed and profit, Hiroshi Mikitani argues for an alternate model that benefits merchants, consumers, and communities alike by empowering players at every step in the process. He envisions retail "ecosystems," where small and mid-sized brick-and-mortar businesses around the world partner with online marketplaces to maximize their customer bases and service capabilities, and he shows why emphasizing collaboration over competition, customization over top-down control, and long-term growth over short-term revenue is by far the best use of the Internet's power, and will define the 3.0 era.Rakuten has already pioneered this new model, and Marketplace 3.0 offers colorful examples of its success in Japan and around the world. Mikitani reveals how the company enforces a global mindset (including the requirement that all its employees speak English, even in Tokyo); how it incorporates new acquisitions rather than seeking to completely remake or sell them for a quick profit; and how it competes with other retailers on speed and quality, without sacrificing the public good. Marketplace 3.0 is an exciting new vision for global commerce, from a company that's challenging all the accepted wisdom.
Seconds to Disaster
Glenn Meade - 2012
˃˃˃ The Plane Truth About Flying "Meade and Ronan pull back the curtain on the airline industry and shine a bright light on the dark corners. Everyone who flies or cares about someone who flies should read this eye-opening account of the current state of commercial air travel. What you don't see can hurt you."--Capt. Chesley "Sully" Sullenberger, retired airline pilot, consultant, speaker, CBS News Aviation and Safety Expert, and author of Making a Difference: Stories of Vision and Courage from America's Leaders and Highest Duty: My Search for What Really Matters ˃˃˃ Children's Safety On Aircraft Is Second Class These revelations are made in the hope that any resulting debate will contribute to making air travel a safer experience for both crew and passengers alike.Seconds to Disaster will not only pose and answer questions as to why accidents happen, but also offer solutions as to how they can be further prevented.And it will explore a highly contentious issue: what parts do both the airline industry and the worldwide watchdog authorities responsible for governing that industry contribute in playing dice with passenger lives, through negligence and collusion.
Scroll up and grab a copy today.
The Little Elixir & OTP Guidebook
Benjamin Tan Wei Hao - 2015
It combines the productivity and expressivity of Ruby with the concurrency and fault-tolerance of Erlang. Elixir makes full use of Erlang's powerful OTP library, which many developers consider the source of Erlang's greatness, so you can have mature, professional-quality functionality right out of the gate. Elixir's support for functional programming makes it a great choice for highly distributed event-driven applications like IoT systems.The Little Elixir & OTP Guidebook gets you started programming applications with Elixir and OTP. You begin with a quick overview of the Elixir language syntax, along with just enough functional programming to use it effectively. Then, you'll dive straight into OTP and learn how it helps you build scalable, fault-tolerant and distributed applications through several fun examples. Come rediscover the joy of programming with Elixir and remember how it feels like to be a beginner again.
A Golf Swing You Can Trust
John Hoskison - 2012
You needn't be most golfers.A Golf Swing You Can Trust is an original work by John Hoskison, a deep-thinking PGA tour player and teacher. Inside, John reveals how, after years of slicing, he went from the worst player on the European Tour to the National PGA Professional Champion by using these simple techniques.From the grip to the finish position, John coaches using humor, photos and unique analogies to explain how the golf swing works and how to build a swing you can trust. Whether a golfer wants to improve their driving off the tee, iron shots to the green or their chipping and pitching, the tips and drills in this book will make it easier to hit the shots consistently. If any golfer wants to build a swing that works, this is a must read. *Don't miss John's new biography about his days on the European Tour called - No Hiding in The Open.* Excerpt from A Golf Swing You Can Trust:The correct stance is vital if you want to build a simple swing that repeats. But most golfers switch off and skip these chapters of a golf instruction book. I understand that. The grip and aim are not as alluring as advice on the theoretical advantages of pronation or supination through impact. And hey! You've been told you have a nice practice swing--you can't be that far off. Aiming correctly is for beginners!So just to dispel any reservations you may have that this book is not for you, here's one last piece of motivational talk before we move on to check your stance. It's very often a golfer makes a great practice swing but when they come to hit the ball the swing's completely different. That's because the hands and body don't communicate on a practice swing--they let you get on with it on your own. They only bother to 'talk' to each other when you're about to hit a shot at a specific target.When the crunch comes and you're ready to swing back, if the aim of the club doesn't match up to your intended swing path, they hit the panic button, take control and stick the swing on autopilot. They program in what they have to do and you can't override it. You might try to take the club back in one piece but it you're not aiming correctly--they quickly take over. And if you think you can kid them you'd have done it by now.If you are aiming at a target 250 yards away and your club face is only 3 degrees to the right, it will be pointing 13 yards right of target. If you try to replicate your nice square practice swing, but your hands pick up where the club is aiming the two angles are so conflicting your orthodox swing becomes impossible.The only time you can override your natural alarm system is when you're standing in front of a pro and he's watching you like a hawk. Then the alarm system becomes dormant--it trusts the pro to watch over you. Soon as you walk out the teaching bay, it switches back on.REVIEWS:"John taught himself great technique and knows as much about the golf swing as anyone I've met. His explanation of the swing is fantastic." ~Nick Mitchell, Former European TourPGA Player"I went to John for the usual stuff; head in hands, not knowing what shot was coming next. John kept it simple... got me back enjoying my golf again.
Are You Smart Enough to Work at Google?
William Poundstone - 2012
The blades start moving in 60 seconds. What do you do? If you want to work at Google, or any of America's best companies, you need to have an answer to this and other puzzling questions. Are You Smart Enough to Work at Google? guides readers through the surprising solutions to dozens of the most challenging interview questions. The book covers the importance of creative thinking, ways to get a leg up on the competition, what your Facebook page says about you, and much more. Are You Smart Enough to Work at Google? is a must-read for anyone who wants to succeed in today's job market.
Murach's HTML5 and CSS3: Training and Reference
Zak Ruvalcaba - 2011
This title also teaches you how to use the HTML5 and CSS3 features alongside the earlier standards.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
Programming Entity Framework: DbContext
Julia Lerman - 2011
This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database
Intermediate Perl
Randal L. Schwartz - 2003
One slogan of Perl is that it makes easy things easy and hard things possible. "Intermediate Perl" is about making the leap from the easy things to the hard ones.Originally released in 2003 as "Learning Perl Objects, References, and Modules" and revised and updated for Perl 5.8, this book offers a gentle but thorough introduction to intermediate programming in Perl. Written by the authors of the best-selling "Learning Perl," it picks up where that book left off. Topics include: Packages and namespacesReferences and scopingManipulating complex data structuresObject-oriented programmingWriting and using modulesTesting Perl codeContributing to CPANFollowing the successful format of "Learning Perl," we designed each chapter in the book to be small enough to be read in just an hour or two, ending with a series of exercises to help you practice what you've learned. To use the book, you just need to be familiar with the material in "Learning Perl" and have ambition to go further.Perl is a different language to different people. It is a quick scripting tool for some, and a fully-featured object-oriented language for others. It is used for everything from performing quick global replacements on text files, to crunching huge, complex sets of scientific data that take weeks to process. Perl is what you make of it. But regardless of what you use Perl for, this book helps you do it more effectively, efficiently, and elegantly."Intermediate Perl" is about learning to use Perl as a programming language, and not just a scripting language. This is the book that turns the Perl dabbler into the Perl programmer.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
The Mobile Mind Shift: Engineer Your Business To Win in the Mobile Moment
Ted Schadler - 2014
What’s tomorrow’s weather? Is the flight on time? Where’s the nearest store, and is this product cheaper there? Whatever the question, the answer is on the phone. This Pavlovian response is the mobile mind shift — the expectation that I can get what I want, anytime, in my immediate context. Your new battleground for customers is this mobile moment — the instant in which your customer is seeking an answer. If you’re there for them, they’ll love you; if you’re not, you’ll lose their business. Both entrepreneurial companies like Dropbox and huge corporations like Nestlé are winning in that mobile moment. Are you?Based on 200 interviews with entrepreneurs and major companies across the globe, The Mobile Mind Shift is the first book to explain how you can exploit mobile moments. You’ll learn how to:• Find your customer’s most powerful mobile moments with a mobile moment audit.• Master the IDEA Cycle, the business discipline for exploiting mobile. Align your business and technology teams in four steps: Identify, Design, Engineer, Analyze.• Manufacture mobile moments as Krispy Kreme does — it sends a push notification when hot doughnuts are ready near you. Result: 500,000 app downloads, followed by a double-digit increase in same-store sales.• Turn one-time product sales into ongoing services and engagement, as the Nest thermostat does. And master new business models, as Philips and Uber do. Find ways to charge more and create indelible customer loyalty.• Transform your technology into systems of engagement. Engineer your business and technology systems to meet the ever-expanding demands of mobile. It’s how Dish Network not only increased the efficiency of its installers but also created new on-the-spot upsell opportunities.Mobile is rapidly shifting your customers into a new way of thinking. You’ll need your own mobile mind shift to respond.
Connecting with Students Online: Strategies for Remote Teaching & Learning
Jennifer Serravallo - 2020
Now that you're making the shift to online teaching, it's time to answer your biggest questions about remote, digitally based instruction:How do I build and nurture relationships with students and their at-home adults from afar? How do I adapt my best teaching to an online setting? How do I keep a focus on students and their needs when they aren't in front of me? Jennifer Serravallo's Connecting with Students Online gives you concise, doable answers based on her own experiences and those of the teachers, administrators, and coaches she has communicated with during the pandemic. Focusing on the vital importance of the teacher-student connection, Jen guides you to:effectively prioritize what matters most during remote, online instruction schedule your day and your students' to maximize teaching and learning (and avoid burnout) streamline curricular units and roll them out digitally record highly engaging short lessons that students will enjoy and learn from confer, working with small groups, and drive learning through independent practice partner with the adults in a student's home to support your work with their child. Featuring simplified, commonsense suggestions, 55 step-by-step teaching strategies, and video examples of Jen conferring and working with small groups, Connecting with Students Online helps new teachers, teachers new to technology, or anyone who wants to better understand the essence of effective online instruction. Along the way Jen addresses crucial topics including assessment and progress monitoring, student engagement and accountability, using anchor charts and visuals, getting books into students' hands, teaching subject-area content, and avoiding teacher burnout.During this pandemic crisis turn to one of education's most trusted teaching voices to help you restart or maintain students' progress. Jennifer Serravallo's Connecting with Students Online is of-the-moment, grounded in important research, informed by experience, and designed to get you teaching well-and confidently-as quickly as possible. Jen will be donating a portion of the proceeds from Connecting with Students Online to organizations that help children directly impacted by COVID-19.
The Unified Software Development Process
Ivar Jacobson - 1999
This book demonstrates how the notation and process complement one another, using UML models to illustrate the new process in action. It describes the constructs such as use cases, actors, and more.