Book picks similar to
The Indispensable Pc Hardware Book: Your Hardware Questions Answered by Hans-Peter Messmer
scanned
technical
comp-prog
for-study-coursework
The Past Present and Future of JavaScript
Axel Rauschmayer - 2012
Now, hopes and expectations for JavaScript’s future are considerable.In this insightful report, Dr. Axel Rauschmayer explains how the combination of several technologies and opportunities in the past 15 years turned JavaScript’s fortunes. With that as a backdrop, he provides a detailed look at proposed new features and fixes in the next version, ECMAScript.next, and then presents his own JavaScript wish list—such as an integrated IDE.
Digital Computer Electronics
Albert Paul Malvino - 1977
The text relates the fundamentals to three real-world examples: Intel's 8085, Motorola's 6800, and the 6502 chip used by Apple Computers. This edition includes a student version of the TASM cross-assembler software program, experiments for Digital Computer Electronics and more.
CISSP for Dummies [With CDROM]
Lawrence C. Miller - 2002
The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertiseCD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versions"CISSP For Dummies, 3rd Edition" can lead you down the rough road to certification successNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
100 No-Equipment Workouts Vol. 1: Fitness Routines You Can Do Anywhere, Any Time
Neila Rey - 2013
The 100 Workouts Book is for everyone who wants to stay active, get fit, build muscle tone and/or shed extra weight in the home environment without acquiring any extra equipment. Be in complete control of your fitness. No more worrying about the right equipment, the right attire, finding a gym, or finding the space or time to exercise. The 100 no-equipment fitness routines in this jumbo A4-size workout book will let you:Exercise on your terms Get fit with the time you have Have fun while getting fitter Stop worrying about the gym culture Find a routine to do whether you are an absolute beginner or someone already fit Different workouts will ensure that your muscles don't get used to the same regime, giving you more in return, and also help you stay active and not get bored with the same routine. Some of the workouts are more challenging and some are easier than others so you will never get bored. All have three different levels you can try them at, so there is always something to aim for.Easy-to-follow visual routines guide you through the workout, as you go from one exercise to the next, in an easier fashion than in a video. Just follow the routine and have fun! You don't have to work through the entire book; you can pick the workouts you like most or randomly select one and make it a workout of the day. Ideally you want to do 3-4 workouts per week.
Successful Business Intelligence: Secrets to Making BI a Killer App
Cindi Howson - 2007
Learn about the components of a BI architecture, how to choose the appropriate tools and technologies, and how to roll out a BI strategy throughout the organisation.
The Guru's Guide to Transact-Sql
Ken Henderson - 2000
Beginners and intermediate developers will appreciate the comprehensive tutorial that walks step-by-step through building a real client/server database, from concept to deployment and beyond -- and points out key pitfalls to avoid throughout the process. Experienced users will appreciate the book's comprehensive coverage of the Transact-SQL language, from basic to advanced level; detailed ODBC database access information; expert coverage of concurrency control, and more. The book includes thorough, up-to-the-minute guidance on building multi-tier applications; SQL Server performance tuning; and other crucial issues for advanced developers. For all database developers, system administrators, and Web application developers who interact with databases in Microsoft-centric environments.
Guerrilla Home Recording: How to Get Great Sound from Any Studio {No Matter How Weird or Cheap Your Gear Is}
Karl Coryat - 2004
The revised edition is updated with a greater focus on digital recording techniques, the most powerful tools available to the home recordist. There are chapters devoted to instrument recording, humanizing drum patterns, mixing with plug-ins and virtual consoles, and a new section on using digital audio skills. And since, many true "Guerrillas" still record to analog tape, we have retained the best of that world. This edition features many more graphics than in the original edition, further enforcing Guerrilla Home Recording's reputation as the most readable, user-frienly recording title on the market.
Windows Presentation Foundation Unleashed
Adam Nathan - 2006
Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications
Sanguine Scent
Reina Torres - 2021
And not in that order. He’s as wild as they come, but when he crashes a garden party he discovers the one woman who may be able to tame the wild within.Then she’s snatched from him and he has hell to pay.What’s the use of vampiric immortality if he’s forced to live alone forever? All he has left is a thirst for revenge.But when his friend brings him to Othercross he catches a glimpse at a second chance…Alba Pacetti uses her love of nature to create the most beautiful gardens in the world. Her ability to tap into the magic of the earth makes her a hot commodity for the warlock who wants to own her, but her heart belongs to someone else. Someone she lost a long time ago.When Amaro finds himself within reach of the woman who was torn from his arms, he’ll stop at nothing to make her his Beloved.**Part of the "Real Men Romance" multi-author world.**
Signal Processing and Linear Systems
B.P. Lathi - 2000
Based on B. P. Lathi's widely used book, Linear Systems and Signals, it features additional applications to communications, controls, and filtering as well as new chapters on analog and digital filters and digital signal processing. Lathi emphasizes the physical appreciation of concepts rather than the mere mathematical manipulation of symbols. Avoiding the tendency to treat engineering as a branch of applied mathematics, he uses mathematics to enhance physical and intuitive understanding of concepts, instead of employing it only to prove axiomatic theory. Theoretical results are supported by carefully chosen examples and analogies, allowing students to intuitively discover meaning for themselves.
Lonely Planet Moscow
Leonid Ragozin - 2000
Prepare yourself for a distinctively Russian cauldron of artistry and history, nightclubs and vibrant street life. Mara Vorhees, Lonely Planet Writer Our PromiseYou can trust our travel information because Lonely Planet authors visit the places we write about, each and every edition. We never accept freebies for positive coverage so you can rely on us to tell it like it is.Inside This Book 80 art galleries & museums59 bars and cafes reviewed28 kremlins, cathedrals & palaces11 revamped exhibitions & art spaces2 banyas to get naked & sweat inComprehensive map sectionFeature coverage of top sightsRange of planning toolsIn-depth background on Russian art, architecture & literature
The Mack Within: The Holy Book of Game
Tariq Nasheed - 2005
Now the expert on mackin' is back with the ultimate straight-up guide for every mack and mack-wannabe. Whether he's after ass or cash, trying to spit game at a Benz-driving Diamond Girl or a street-tough Copper Chick, or if he's just tired of being coochie-whipped, it's time to open up this book and unlock the time-tested secrets of the pimp game.
An Introduction to Enterprise Architecture
Scott A. Bernard - 2005
I wrote this book for three major reasons: (1) to help move business and technology planning from a systems and process-level view to a more strategy-driven enterprise-level view, (2) to promote and explain the emerging profession of EA, and (3) to provide the first textbook on the subject of EA, which is suitable for graduate and undergraduate levels of study. To date, other books on EA have been practitioner books not specifically oriented toward a student who may be learning the subject with little to no previous exposure. Therefore, this book contains references to related academic research and industry best practices, as well as my own observations about potential future practices and the direction of this emerging profession.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.