Book picks similar to
Managed Code Rootkits: Hooking Into Runtime Environments by Erez Metula
security
information-security
infosec-books
technical
The Ironwood Plantation Family Saga: The Complete Series
Stephenia H. McGee - 2020
Civil War pits countrymen against one another and tears a nation asunder. Life and death are held in the balance where everyone is a slave to something. In a time when war brings the South to its knees, two women will forge a friendship in the fires of redemption and thrust Ironwood into a new future – where the battle for freedom has merely begun. Book Two: Heir of HopeA hidden diary. Dreams of the past. And a hope for a new future. Emily Burns grew up an orphan, so she never expected to inherit a southern plantation. When she discovers an old diary hidden in the attic, her life becomes strangely entwined with her Civil War ancestor and she soon begins to wonder how a woman long dead can keep showing up in her dreams.Book Three: Missing MercyThe venture ahead could leave their friendship behind.Made a safe-haven after the Civil War, Ironwood Plantation is a refuge of equality for former slaves. But twenty years and a new generation later, they have become an isolated community with little contact with the rest of the world.In a time where prejudices try to define them, Mercy Carpenter and Faith Harper must push the boundaries of their beliefs and trust in the God who holds the keys to freedom.
Wild Shifters: Shifter Romance Collection
Lola Gabriel - 2021
Guardian Hostage Rescue Specialists Boxed Set, Books 1-4
Ellie Masters - 2021
Billionaire Vacation: The Complete Series (Alpha Billionaire Romance Love Story)
Nella Tyler - 2016
Not only did she need summer break the way all teachers do, but she also needed to get away from life for a while—and leave the humiliation of her fiancé dumping her a month before the wedding behind. What better way to relax than a month-long stay in Hawaii? Things get off to a rough start when Megan makes a fool of herself at the baggage carousel, but lucky for her, handsome Drake Hanover is there to sweep her off her feet—or rather, get her back on them. And, as fate would have it, they are staying at the same resort, one which Drake intends to buy. While adventure was part of the plan, the two of them, and a few friends, find themselves caught up in the adventure of a lifetime—one that involves shadowy figures, plenty of deception, and a lot of hidden treasure. And what better way to fall in love than over a little bit of danger in paradise? Billionaire Vacation is a steamy alpha billionaire romance. No cliffhanger and has a HEA. Includes 3 free bonus full-length novels for a limited time.
Diary Of An 80s Computer Geek: A Decade of Micro Computers, Video Games & Cassette Tape
Steven Howlett - 2014
The 1980s were certainly loud, often garish and utterly fabulous - no matter how embarrassing the outfits were.There are so many elements, which made the 80s a truly great decade, but one of the greatest contributions, if not the greatest, is the mass introduction of affordable 8-bit home micro computers.These curious machines of geekdom changed the way we regarded computers and technology. No longer were they the sole perverse of tweed jacket clad scientists sporting unruly beards, micro computers were now forming a staple inventory in millions of homes.Much of the technology that we enjoy today, such as desktop computers, notebooks, tablets, gaming consoles and smart phones, all of which are often taken for granted, can be traced back to this innovative decade.If you were a child of the 80s and remember the joy of receiving your very first home computer or maybe a young adult who fondly remembers the excitement, then you will appreciate this unabashed reminiscence of a simpler time whose adolescent technological was on the cusp of great advancements.This book is intended as celebration and reflection of all the computer technology that made the 80s such a wonderful, pioneering period and follows the journey of a self confessed, teenaged computer geek who experienced and enjoyed every ground breaking moment, including publishing his own software.10 Print “The 80s are fab!”20 Goto 10RunAuthor's Comments:The current edition is dated 31st January 2016 and has been edited based on customer feedback.
Shopping Addiction: The Ultimate Guide for How to Overcome Compulsive Buying And Spending (Compulsive Spending, Compulsive Shopping, Retail Therapy, Shopaholic, ... Compulsive Debtors, Debtors Anonymous)
Caesar Lincoln - 2014
Millions of people suffer from a shopping addiction and throw away their personal and professional success because of these issues. Most people realize how much of a problem this is, but are unable to change their situation, simply because it's been apart of their mindset for so long. The truth is, if you are suffering from limitations because of your shopping addiction and haven't been able to change, it's because you are lacking an effective strategy and understanding of where your addiction is coming from and why it is so hard to stop. This book goes into where shopping addictions originate, signs and symptoms of a compulsive shopper, and a step-by-step strategy that will help you free yourself from your addiction and help you take control of your life. Here Is A Preview Of What You'll Learn...
Understanding Shopping Addiction
Negative Effects of A Shopping Addiction
The Signs And Symptoms Of An Addiction
How To Overcome The Addiction Once And For All
Take action right away to overcome your shopping addiction by downloading this book, "Shopping Addiction: The Ultimate Guide for How To Overcome Compulsive Buying And Spending", for a limited time discount! Download today!
Sinatra: Up and Running
Alan Harris - 2011
With this concise book, you will quickly gain working knowledge of Sinatra and its minimalist approach to building both standalone and modular web applications.
Sinatra serves as a lightweight wrapper around Rack middleware, with syntax that maps closely to functions exposed by HTTP verbs, which makes it ideal for web services and APIs. If you have experience building applications with Ruby, you’ll quickly learn language fundamentals and see under-the-hood techniques, with the help of several practical examples. Then you’ll get hands-on experience with Sinatra by building your own blog engine.
Learn Sinatra’s core concepts, and get started by building a simple application
Create views, manage sessions, and work with Sinatra route definitions
Become familiar with the language’s internals, and take a closer look at Rack
Use different subclass methods for building flexible and robust architectures
Put Sinatra to work: build a blog that takes advantage of service hooks provided by the GitHub API
Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications
Bilgin Ibryam - 2019
These modern architectures use new primitives that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huß from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud-native applications on Kubernetes.Each pattern includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud-native patterns.You'll learn about the following pattern categories:Foundational patterns cover the core principles and practices for building container-based cloud-native applications.Behavioral patterns explore finer-grained concepts for managing various types of container and platform interactions.Structural patterns help you organize containers within a pod, the atom of the Kubernetes platform.Configuration patterns provide insight into how application configurations can be handled in Kubernetes.Advanced patterns cover more advanced topics such as extending the platform with operators.
Core JavaServer Faces (Core Series)
David M. Geary - 2004
Now, Core JavaServer™ Faces–the #1 guide to JSF–has been thoroughly updated in this second edition, covering the latest feature enhancements, the powerful Ajax development techniques, and open source innovations that make JSF even more valuable. Authors David Geary and Cay Horstmann delve into all facets of JSF 1.2 development, offering systematic best practices for building robust applications, minimizing handcoding, and maximizing productivity. Drawing on unsurpassed insider knowledge of the Java platform, they present solutions, hints, tips, and “how-tos” for writing superior JSF 1.2 production code, even if you’re new to JSF, JavaServer Pages™, or servlets.The second edition’s extensive new coverage includes: JSF 1.2’s improved alignment with the broader Java EE 5 platform; enhancements to the JSF APIs; controlling Web flow with Shale; and using Facelets to replace JSP with XHTML markup. The authors also introduce Ajax development with JSF–from real-time validation and Direct Web Remoting to wrapping Ajax in JSF components and using the popular Ajax4jsf framework.This book will help you
Automate low-level details and eliminate unnecessary complexity in server-side development
Discover JSF best practices, ranging from effective UI design and style sheets to internationalization
Use JSF with Tiles to build consistent, reusable user interfaces
Leverage external services such as databases, LDAP directories, authentication/authorization, and Webservices
Use JBoss Seam to greatly simplify development of database-backed applications
Implement custom components, converters, and validators
Master the JSF 1.2 tag libararies, and extend JSF with additional tag libraries
Preface Acknowledgments Chapter 1: Getting Started Chapter 2: Managed Beans Chapter 3: Navigation Chapter 4: Standard JSF Tags Chapter 5: Data Tables Chapter 6: Conversion and Validation Chapter 7: Event Handling Chapter 8: Subviews and Tiles Chapter 9: Custom Components, Converters, and Validators Chapter 10: External Services Chapter 11: Ajax Chapter 12: Open Source Chapter 13: How Do I . . . Index
Domain-Driven Design in PHP
Carlos Buenosvinos
Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
Instagram Handbook
Bambang Dwi Atmoko - 2012
Bentuknya yang ringkas, multifungsi, dan selalu dibawa kemana saja, membuat ponsel mulai menjadi favorit untuk mengabadikan momen dalam bentuk foto, yang kadang datang tidak terduga.Berkembangannya fotografi ponsel ini didukung oleh perkembangan teknologi, salah satunya aplikasi berbagi foto fenomenal bernama Instagram.Buku ini mengupas lengkap aplikasi Instagram, mulai dari langkah-langkah penggunaan sampai cara mengoptimalkannya, juga membahas teknik fotografi ponsel, olah digital secara langsung di ponsel, dan tool-tool pilihan lainnya yang membuat hasil foto kamu lebih keren.Ayo, jepret, abadikan, dan bagikan!-----With a compact forms, multifunctional, and always carry anywhere, makes smartphone as favorite devices to capture the moment, which sometimes come unexpectedly.The rise of mobile photography is supported by the development of technology, the one phenomenal photo sharing app called Instagram.The book examines in detail applications Instagram, ranging from the use of measures to optimize the way, also discusses photographic techniques phones, digital though directly on mobile phones, tools and other options that make the images you cooler.Come on, snap, capture, and share!
The Secret Letter: Darkness Past- Book 1
Roger Hayden - 2017
Homicide Detective Michael Dobson has seen many things in his long years on the force, but nothing can prepare him for a series of murders linked through the same mysterious chain letter mailed to the victims before their untimely demise. The answers lie in the victims’ pasts, leading Dobson and his rookie partner on a serpentine quest through the dark recesses of vengeance and betrayal. Can he stop the killer in time, or will a brutal fate await all who have made the killer’s list?
The Five Points' Mob Collection: Filthy, Filthy Rich, and Filthy Dark
Serena Akeroyd - 2022
FILTHY One taste was all it took. She's mine. Whether she likes it or not... This is Finn O'Grady's story. FILTHY RICH The bruises on my bride's face stir the monster in me. Someone's touched my property. I'm Irish Mob. We kill to protect our women. We reap nightmares on those who harm them. And I’m the biggest nightmare of them all. This is Eoghan O'Donnelly's story. FILTHY DARK Loving someone means making them hate you to keep them safe, to get them away from the toxicity that is your world. I destroyed us before we even had a chance to begin… Can a near death experience bring both my kid and the woman who owns my heart back to me? This is Declan O'Donnelly's story. Contains never-before-seen bonus chats!!
Bellingwood Book 12 Vignettes
Diane Greenwood Muir - 2016
Vignette #2 brings back a very minor character - Simon Gardner, the owner of the local Antique Shoppe. The third vignette takes us to Sweet Beans and an interaction between Sal and Camille. There is always something happening at the coffee shop. Vignette #4 is a little deeper insight into some of the agony that Heath Harvey has faced at the loss of his parents. His life changed drastically and the boy never was given time to deal with it. The final vignette - #5 is a look at our favorite waitress from Joe's Diner. Lucy is a steady, solid presence in the lives of so many people in Bellingwood, but what is her story? This is an opportunity to find out.The Bellingwood books are written from Polly's perspective and every once in a while it's fun to look at what's happening behind the scenes from the viewpoint of other characters. These vignettes were originally published on the nammynools.com website and in the monthly email newsletter to Bellingwood readers.