Objects First with Java: A Practical Introduction Using BlueJ


David J. Barnes - 2002
    It takes a truly objects first approach to teaching problem solving using Java. These are complicated concepts so the book uses the development environment BlueJ to help the student's understanding. BlueJ has a strong emphasis on visualization and interaction techniques, and allows the students to manipulate objects and call methods as a first exercise. BlueJ is free and freely available, and has been developed specifically for teaching. The book is loaded with projects so that the student can really get a grip on actually solving problems; and it takes a spiral approach , introducing a topic in a simple context early on, then revisiting it later in the book to deepen understanding. It also comes with a CD containing JDK, BlueJ, a BlueJ tutorial and code for all the projects. The website contains style guide for all examples, PowerPoints for lecturers and also a Solutions Manual.

An Introduction to Enterprise Architecture


Scott A. Bernard - 2005
    I wrote this book for three major reasons: (1) to help move business and technology planning from a systems and process-level view to a more strategy-driven enterprise-level view, (2) to promote and explain the emerging profession of EA, and (3) to provide the first textbook on the subject of EA, which is suitable for graduate and undergraduate levels of study. To date, other books on EA have been practitioner books not specifically oriented toward a student who may be learning the subject with little to no previous exposure. Therefore, this book contains references to related academic research and industry best practices, as well as my own observations about potential future practices and the direction of this emerging profession.

Metaprogramming Elixir


Chris McCord - 2015
    Maybe you’ve played with the basics or written a few macros. Now you want to take it to the next level. This book is a guided series of metaprogramming tutorials that take you step by step to metaprogramming mastery. You’ll extend Elixir with powerful features and write faster, more maintainable programs in ways unmatched by other languages.You’ll start with the basics of Elixir’s metaprogramming system and find out how macros interact with Elixir’s abstract format. Then you’ll extend Elixir with your own first-class features, write a testing framework, and discover how Elixir treats source code as building blocks, rather than rote lines of instructions. You’ll continue your journey by using advanced code generation to create essential libraries in strikingly few lines of code. Finally, you’ll create domain-specific languages and learn when and where to apply your skills effectively.When you’re done, you will have mastered metaprogramming, gained insights into Elixir’s internals, and have the confidence to leverage macros to their full potential in your own projects.

Decision Support Systems and Intelligent Systems


Efraim Turban - 1998
    

Omega Five


Kenna Coulby - 2017
     Chasing Wendy Chase Owen doesn’t sleep much. What he does do is watch the world very carefully, keeping a wary eye out to make sure that his Marine brothers, recently returned with him from Iraq and Afghanistan, are safe. Another thing Owen doesn’t do much of is open up to anyone about the painful scars he bears from losing his dear friend overseas. Then Wendy walks into his life one night at a diner, and Owen’s life takes a sharp right turn. So does Wendy’s, for that matter. Neither the diner waitress nor the Marine have any idea that, together, they will begin to rebuild each other’s lives—and each other. There’s just the matter of Wendy’s abusive ex to be dealt with, along with the stalker terrorizing Owen’s deceased brother-in-arm’s wife. Hacking Taylor Brynn Hardy made a mistake in high school that has haunted her into her twenties. Arriving at Walsh Technologies, she is in no way looking for a new start—the same demons that have always ridden her are right there in the cubicle beside her. When Bradley Taylor, head of the contract team Brynn will be working with, starts asking dangerous questions, Brynn knows it’s only a matter of time before her shady past comes to light. Will Taylor trust the rapport they’ve built between each other enough to listen to Brynn’s side of things, or will he turn her in and blow up her carefully reconstructed life? Finding Thomson Ever since returning from Iraq, Rory Thomson has been making his way through life day by day, basically at survival level. He’s found fulfillment in his work at a rec center with urban teenagers, but it doesn’t fill the void that his experiences in the war have left in him. Then Beth walks in, desperately searching for a student in her class who has gone missing, and Thomson is drawn into not only the mystery of Aiden’s disappearance, but of how he can develop a relationship with the beautiful, caring woman. Ultimately, Beth’s love might just prove the anchor that saves Aiden and Thomson from their demons. And they just might her saviors, too. Chasing Jensen Chloe’s evenings as a bartender, working to pay for grad school, are fairly routine. Loud music, drunk people, and obnoxious jerks who hit her on nonstop are the norm. But when one particular guy’s flirtation turns into protection when he defends her from an assault by a customer, Chloe starts to look at the handsome Marine differently. She has no idea that, in starting to explore a relationship with Byrne Jensen, she is putting her life in danger. Nor does she have any idea that he will put himself in the line of fire again and again, to defend the beautiful woman who is helping him begin to heal from the trauma of war. Loose Ends After months of living rough on the streets and in sleazy motels, Chelsea is more than ready for some kind of a break. She doesn’t anticipate that it will come in the form of Garrett Moss, a former Marine who is hot on the trail of her former boyfriend’s boss—a crime boss, to be more precise. Joining forces with Moss has the unexpected side effect of giving Chelsea a warm, clean bed to sleep on, with a solid, protective body beside her. A less pleasant side effect is the arrival of the crime boss’s goons, hell-bent on ending Moss—and now Chelsea, too, due to her association with him.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Adobe Photoshop CS6 Classroom in a Book (Classroom in a Book (Adobe))


Adobe Creative Team - 2012
    Adobe Photoshop CS6 Classroom in a Book

The New Kingmakers: How Developers Conquered the World


Stephen O’Grady - 2013
    In a 1995 interview, the late Steve Jobs claimed that the secret to his and Apple’s success was talent. “We’ve gone to exceptional lengths to hire the best people,” he said, believing that the talented resource was twenty-five times more valuable than an average alternative. For Microsoft founder Bill Gates, the multiple was even higher:A great lathe operator commands several times the wage of an average lathe operator, but a great writer of software code is worth 10,000 times the price of an average software writer.While the actual number might be up for debate, the importance of technical talent is not. The most successful companies today are those that understand the strategic role that developers will play in their success or failure. Not just successful technology companies – virtually every company today needs a developer strategy. There’s a reason that ESPN and Sears have rolled out API programs, that companies are being bought not for their products but their people. The reason is that developers are the most valuable resource in business.How did we get here? How did developers become the most important constituency in business seemingly overnight? The New Kingmakers explores the rise of the developer class, its implications and provides suggestions for navigating the new developer-centric landscape.

Statistics for Management: Student Solutions Manual


Richard I. Levin - 1999
    

Explain the Cloud Like I'm 10


Todd Hoff - 2018
    And I mean all the time. Every day there’s a new cloud-based dating app; a new cloud-based gizmo for your house; a new cloud-based game; or a thousand other new things—all in the cloud.The cloud is everywhere! Everything is in the cloud! What does it mean! Let’s slow down. Take a deep breath. That’s good. Take another. Excellent. This book teaches you all about the cloud. I’ll let you in on a little secret: the cloud is not that hard to understand. It’s not. It’s just that nobody has taken the time to explain to you what the cloud is. They haven’t, have they?Deep down I think this is because they don’t understand the cloud either, but I do. I’ve been a programmer and writer for over 30 years. I’ve been in cloud computing since the very start, and I’m here to help you on your journey to understand the cloud. Consider me your tour guide. I’ll be with you every step of the way, but not in a creepy way.I take my time with this book. I go slow and easy, so you can build up an intuition about what the cloud really is, one idea at a time. When you finish reading, you’ll understand the cloud. When you hear someone say some new cool thing is in the cloud, you’ll understand exactly what they mean. That’s a promise. How do I deliver on that promise? I use lots and lots of pictures. I use lots and lots of examples. We’ll reveal the secret inner-workings of AWS, Netflix, Facebook Messenger, Amazon Kindle, Apple iCloud, Google Maps, Nest and cloud DVRs. You’ll learn by seeing and understanding; no matter if you're a complete beginner, someone who knows a little and wants to learn more, or a programmer looking to change their career to the cloud.The cloud is the future. You don't want to miss out on the future, do you? Read this book and we'll discover it together.I’m excited. This will be fun. Let’s get started!

Python: Programming: Your Step By Step Guide To Easily Learn Python in 7 Days (Python for Beginners, Python Programming for Beginners, Learn Python, Python Language)


iCode Academy - 2017
    Are You Ready To Learn Python Easily? Learning Python Programming in 7 days is possible, although it might not look like it

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system

Calculus


Ron Larson - 1999
    It has been widely praised by a generation of users for its solid and effective pedagogy that addresses the needs of a broad range of teaching and learning styles and environments. Each title is just one component in a comprehensive calculus course program that carefully integrates and coordinates print, media, and technology products for successful teaching and learning.

The ARRL Extra Class License Manual for Ham Radio


H. Ward Silver - 2002
    Whenyou upgrade to Extra Class, you gain access to the entire Amateur Radio frequency spectrum. Ues this book to ace the top-level ham radio licensing exam. Our expert instruction will lead you through all of the knowledge you need to pass the exam: rules, specific operating skills and more advanced electronics theory.

30 Arduino Projects for the Evil Genius


Simon Monk - 2010
    You'll master Arduino through a series of projects while learning the required simplified C programming.