Apprenticeship Patterns: Guidance for the Aspiring Software Craftsman


Dave Hoover - 2009
    To grow professionally, you also need soft skills and effective learning techniques. Honing those skills is what this book is all about. Authors Dave Hoover and Adewale Oshineye have cataloged dozens of behavior patterns to help you perfect essential aspects of your craft. Compiled from years of research, many interviews, and feedback from O'Reilly's online forum, these patterns address difficult situations that programmers, administrators, and DBAs face every day. And it's not just about financial success. Apprenticeship Patterns also approaches software development as a means to personal fulfillment. Discover how this book can help you make the best of both your life and your career. Solutions to some common obstacles that this book explores in-depth include:Burned out at work? "Nurture Your Passion" by finding a pet project to rediscover the joy of problem solving.Feeling overwhelmed by new information? Re-explore familiar territory by building something you've built before, then use "Retreat into Competence" to move forward again.Stuck in your learning? Seek a team of experienced and talented developers with whom you can "Be the Worst" for a while. "Brilliant stuff! Reading this book was like being in a time machine that pulled me back to those key learning moments in my career as a professional software developer and, instead of having to learn best practices the hard way, I had a guru sitting on my shoulder guiding me every step towards master craftsmanship. I'll certainly be recommending this book to clients. I wish I had this book 14 years ago!" -Russ Miles, CEO, OpenCredo

Rethinking the Internet of Things: A Scalable Approach to Connecting Everything


Francis Dacosta - 2013
    Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry

Computational Fluid Dynamics


John D. Anderson Jr. - 1995
    It can also serve as a one-semester introductory course at the beginning graduate level, as a useful precursor to a more serious study of CFD in advanced books. It is presented in a very readable, informal, enjoyable style.

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet


Eoghan Casey - 1999
    Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about: • Components of computer networks • Use of computer networks in an investigation • Abuse of computer networks • Privacy and security issues on computer networks • The law as it applies to computer networks• Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence • Offers readers information about relevant legal issues • Features coverage of the abuse of computer networks and privacy and security issues on computer networks• Free unlimited access to author's Web site which includes numerous and frequently updated case examples

Art of Leadership


J. Donald Walters - 2001
    Most leaders need reminding everyday that with their privileges comes responsibility and obligation. If any young man or woman seeking to become a leader and not a manager only reads one book on leadership, let it be this one!

Nmap Cookbook: The Fat-free Guide to Network Scanning


Nicholas Marsh - 2010
    Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.

Sell with Soul: Creating an Extraordinary Career in Real Estate without Losing Your Friends, Your Principles or Your Self-Respect


Jennifer Allan-Hagedorn - 2008
    Largely autobiographical, the author shares her rise from a nervous rookie agent to a successful real estate broker in Denver, Colorado. The book also contains detailed instructions and checklists for many of the activities a new agent must master, such as building a contact database, learning the market, working with buyers, marketing listings and negotiating inspections. Allan-Hagedorn also shares more than 60 stories from her own career - some positive and others not-so - that will help the new agent better understand her cautions and recommendations. Sell with Soul also speaks out against the status quo. Allan-Hagedorn describes the differences between the "Old School" philosophy of real estate thought and her own "soulful" philosophy. She asks agents to consider the needs of their clients first, before considering their own personal need for a paycheck. She counsels them to welcome every "learning experience," even when the experience does not result in a closed sale. She urges new licensees to strive to be competent and knowledgeable before they ask the general public to honor them with their business. Many new agents have written to tell Allan-Hagedorn how her book gave them hope that they could succeed without sacrificing their principles or changing their personalities. Even experienced agents have expressed that reading Sell with Soul changed the direction of their real estate careers.

Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)


Andy Oram - 2009
    Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).

Leadership: Enhancing the Lessons of Experience


Richard L. Hughes - 1993
    The text consists of 13 chapters and a final section on Basic and Advanced Leadership Skills. Authors Hughes, Ginnett, and Curphy have drawn upon three different types of literature: empirical studies; interesting anecdotes, stories and findings; and leadership skills to create a text that is personally relevant, interesting and scholarly. The authors' unique quest for a careful balancing act of leadership materials help students apply theory and research to their real-life experiences.

Mastering the Nikon D7000


Darrell Young - 2011
    Darrell is determined to help the user navigate past the confusion factor that often comes with complex and powerful professional camera equipment. The book explores the features and capabilities of the camera in a way that far surpasses the user’s manual. It guides readers through the camera features with step-by-step setting adjustments; color illustrations; and detailed how, when, and why explanations for each option. Every button, dial, switch, and menu configuration setting is explored in a user-friendly manner, with suggestions for setup according to various shooting styles. Darrell’s friendly and informative writing style allows readers to easily follow directions, while feeling as if a friend dropped in to share his knowledge. The learning experience for new D7000 users goes beyond just the camera itself and covers basic photography technique.

Mastering ArcGIS


Maribeth H. Price - 2003
    The author's step-by-step approach helps students negotiate the challenging tasks involved in learning sophisticated GIS software. The fifth edition is updated to follow the new software release of ArcGIS 10. An innovative and unique feature of "Mastering ArcGIS" is its accompanying CD-ROM with narrated video clips that show students exactly how to perform chapter tutorials before attempting an exercise on their own.

Access 2013 Bible


Michael Alexander - 2013
    However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a thorough look at everything Access can do.Explains how to create tables, manipulate datasheets, and work with multiple tables Teaches you how to apply the seven-step design method to build databases that are tailored to your needs Covers building forms with wizards, creating bound and unbound forms, and adding data validation Shows you ways to automate query parameters, create functions and subroutines, and add programmed error routines Features a bonus website with content that contains all source code from the book as well as bonus shareware, freeware, trial, demo, and evaluation programs If you are looking for a comprehensive book on all things Access, look no further than Access 2013 Bible.

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft Windows XP Professional


Walter Glenn - 2005
    Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 425 challenging questions for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers--including a customized learning path that describes how and where to focus your studies.Maximize your performance on the exam by learning how to: Perform an installation or upgrade, including remote deploymentConfigure and customize the desktop environmentAdminister disks, device drivers, printers, file systems, and other resourcesManage TCP/IP networking and support remote and mobile usersMonitor, troubleshoot, and tune system performanceNEW!--Administer security settings and services, including the advances in Windows XP Service Pack 2Readiness Review Suite on CD Powered by MeasureUpYour kit includes: NEW--Fully reengineered self-paced study guide with expert exam tips. NEW--Readiness Review Suite featuring 425 questions and multiple testing options. NEW--Case scenarios and troubleshooting labs for real-world expertise. NEW--120-day evaluation version of Windows XP Professional software with Windows XP Service Pack 2.NEW--eBook in PDF format. NEW--Microsoft Encyclopedia of Security eBook. NEW--Microsoft Encyclopedia of Networking, Second Edition eBook.For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Fundamentals of Digital Image Processing


Anil K. Jain - 1988
    Includes a comprehensive chapter on stochastic models for digital image processing. Covers aspects of image representation including luminance, color, spatial and temporal properties of vision, and digitization. Explores various image processing techniques. Discusses algorithm development (software/firmware) for image transforms, enhancement, reconstruction, and image coding.

The Escape Manifesto: Quit Your Corporate Job. Do Something Different!


Escape the City - 2013
    BE BRAVE AND START SOMETHING YOU LOVE.Does this sound familiar... You tick all the right boxes; school, university, corporate career. You have a sensible profession, a fancy job title, proud parents, decent salary, pricey holidays…but there’s a nagging feeling that something isn’t quite right? A realisation that you’re not completely fulfilled? Surely you should be as happy as Larry – are you being ungrateful? HELL NO. You want a different life – no spreadsheets, no commute, no late nights at the office. But if not that…then what? That is exactly what Escape The City are here to do – show you what other options are open to you.Escape The City is a community based website built around a simple concept: there is more to life than doing unfulfilling work in big corporate companies. The online platform is designed to help corporate professionals find exciting jobs, start their own businesses, and go on big adventures. The Escape Manifesto is here to support, inspire and encourage us all to make big and brave transitions in our lives.• Examines the reasons why so many people are unsatisfied with the corporate world• Explores the alternatives and the common barriers to achieving your dreams• Advice and support for making the transition to something new and developing a strategy for work and life• Contains tons of real-life examples of people who have made the leap