Introductory Linear Algebra: An Applied First Course


Bernard Kolman - 1988
    Calculus is not a prerequisite, although examples and exercises using very basic calculus are included (labeled Calculus Required.) The most technology-friendly text on the market, Introductory Linear Algebra is also the most flexible. By omitting certain sections, instructors can cover the essentials of linear algebra (including eigenvalues and eigenvectors), to show how the computer is used, and to introduce applications of linear algebra in a one-semester course.

Absolute Beginner's Guide to C


Greg Perry - 1993
    This bestseller talks to readers at their level, explaining every aspect of how to get started and learn the C language quickly. Readers also find out where to learn more about C. This book includes tear-out reference card of C functions and statements, a hierarchy chart, and other valuable information. It uses special icons, notes, clues, warnings, and rewards to make understanding easier. And the clear and friendly style presumes no programming knowledge.

Architecting for the AWS Cloud: Best Practices (AWS Whitepaper)


Amazon We Services - 2016
    It discusses cloud concepts and highlights various design patterns and best practices. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen


Jonathan Littman - 1997
    Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.

Core Java: An Integrated Approach


R. Nageswara Rao - 2008
    Considering just how java is dominating the software industry these days, it is vital for all software and it professionals to be knowledgeable in it. This book is ideal even for new learners as it provides detailed descriptions even of the basic concepts of java, in a very simple and easily understandable way. The best part about using this book is that once you have gone through it, you are sure to be able to write basic java programs on your own. Another highlight of this book is that instead of being vague, it provides you with a detailed explanation of all the concepts that concern this topic. Core java: an integrated approach includes many examples that are helpful as they help students get rid of the fears that they have, concerning programming. Students are also provided with an exhaustive list of questions concerning the topic, which are frequently asked in interviews. This is beneficial for students as they appear for interviews in the future. The first edition of the core java: an integrated approach has been published by dreamtech press in the year 2008 and is available in paperback.key features: this book includes 32 chapters that focus on various java-related topics. Students are provided with an exhaustive list of questions that often feature in interviews for programming jobs.

Business Data Communications and Networking


Jerry FitzGerald - 1995
    Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field.Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared.

Those Want Ads Can Be Murder


Les Macdonald - 2014
    All of the cases end in murder. The stories start with The Black Widow of Laporte, Indiana which is the story of.Belle Gunness and her use of the want ads in the early 1900's. We work our way through the 20th century with The French Bluebeard, The Bogeyman, The Torch Murderer, The Bluebeard of Quiet Dell, The Lonely Hearts Killers, It's A Family Affair, The Lonely Hearts Husband Killer, Harv the Hammer and The Glamour Girl Killer. The final section of the book features nine cases where Craigslist ads have resulted in murder. There are more than 80 pictures throughout the book.

The Hobbyist's Guide to the RTL-SDR: Really Cheap Software Defined Radio


Carl Laufer - 2014
    The RTL-SDR is a super cheap software defined radio based on DVB-T TV dongles that can be found for under $20. This book is about tips and tutorials that show you how to get the most out of your RTL-SDR dongle. Some projects described in this book are also compatible with other wideband SDRs like the HackRF, Airspy and SDR Play. What's in the book Learn how to set up your RTL-SDR with various free software defined radio programs such as SDR#, HDSDR, SDR-Radio and more. Learn all the little tricks and oddities that the dongle has. A whole chapter dedicated to improving the RTL-SDR's performance. Dozens of tutorials for fun RTL-SDR based projects such as ADS-B aircraft radar, AIS boat radar, ACARS decoding, receiving NOAA and Meteor-M2 weather satellite images, listening to and following trunked radios, decoding digital voice P25/DMR signals, decoding weather balloon telemetry, receiving DAB radio, analysing GSM and listening to TETRA signals, decoding pagers, receiving various HF signals such as ham radio modes, weatherfax and DRM radio, decoding digital D-STAR voice, an introduction to GNU Radio, decoding RDS, decoding APRS, measuring filters and SWR with low cost equipment, and many many more projects! Guide to antennas, cables and adapters. This book is updated every 3-4 months to ensure information is fresh and up to date. Updates are available for free for all customers. Note: To update the book you must manually contact Kindle support and request the update. Last updated to edition 4.1 on 15 June 2015.

Writing Secure Code


Michael Howard - 2001
    You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Saving Stacy: The Untold Story of the Moody Massacre


Rob St. Clair - 2019
    The first time the killer thought he had succeeded, and he left Stacy bleeding in her bed. But a few minutes later he must have heard her moaning and returned to her upstairs bedroom. This time he approached the bed, pointed a .22 caliber rifle at her young face, and pulled the trigger again. Then he left.Later that morning, Memorial Day, May 25, 2005, the Logan County Sheriff would declare it a rampage. According to Sheriff Henry, 18-year-old Scott Moody lived on a family farm with his mother and sister; his grandparents lived nearby. The night before his high school graduation something snapped, and Scott went on a shooting spree. He murdered his two grandparents, his mother, a high school classmate who had spent the night after a graduation party, his girlfriend, and then he turned the rifle on himself, committing suicide. He thought he had killed his 15-year-old sister, but she was life-flighted to a hospital in Columbus where she remained in critical condition. Sheriff Henry declared the mystery solved: “It was horribly tragic, a murder/suicide case.”Three days later, Stacy woke up in intensive care. When asked by the county coroner to explain what happened – clearly expecting her to say that her brother, Scott, had shot her – Stacy, in a weak, distressed voice said something else. It was an older man with gray hair, wearing a blue shirt, someone she had never seen before. And then, once again – what everyone suspected but were afraid to publicly talk about – was the Logan County Sheriff’s Office really corrupt?After Stacy was released from the hospital, Detective Jon Stout wanted to interview her in private, away from the influence of her father and stepmother. On a Sunday afternoon he took 15-year-old Stacy in his unmarked cruiser to a shaded parking lot behind the county children services building. It was there he coerced her into taking off her clothes, playfully handcuffing her to the steering wheel, and then forcibly having sex with her. It was only a matter of time before wrongful death actions were filed against Scott’s estate. That’s when Scott’s father, wanting to remove the stigma of his son’s reputation, hired outside experts, who easily refuted the idea that Scott had been the shooter. People in the community knew all along what had happened. The sheriff’s office was corrupt. Underage sex and illicit drugs had finally raised their ugly heads.

Schneier on Security


Bruce Schneier - 2008
    Crime: Now We're Talking- MySpace Passwords Aren't So Dumb- An American Idol for Crypto Geeks- Why Smart Cops Do Dumb Things- How Security Companies Sucker Us With LemonsEach section will have a significant introduction by the author. As well, the author will be writing at least 6-10 never-before-published articles.

The Complete Free Kindle Fire Apps (Free Kindle Fire Apps That Don't Suck Book 1)


The App Bible - 2012
    This is the one you want… Personally, I will check out any book this author writes about apps because, for some reason, maybe a bad case of OCD, he is obviously compelled to do the most thorough investigation into each and every aspect, good and bad of apps in a particular genre. My hat's off to him, and he has my thanks for saving me a ton of time and grief.” - Linda Abbott (Reviewer) Nearly 800 Pages of In-Depth Reviews, and Tips and Tricks to Help You Get The Most Out of Your Free Kindle Fire Apps Question: Why Do You Need This Book? Answer: Because you have better things to do with your time than to trudge through the Amazon App Store and test tons of apps until you find the best ones Question: OK. But Why Do You Need To Buy THIS Book? Answer: Because you need more than some random list of “Top Kindle Fire Apps.” You also need: To know which apps to download first Tips and tricks for how to get the most out of the apps How to find help if you’re having a problem with an app An in-depth review describing what is good and what is bad about each app Problem: Even if you have a list of the top free apps, how do you know which ones to install first? Solution: At the end of this book, all the apps are ranked from best to worst according to a UNIQUE RANKING SYSTEM FOUND ONLY IN MY BOOKS Question: How Else Is This Book Unique? Answer: In addition to its unique ranking system, it also offers in-depth reviews that provide the following: A summary of what the app does A summary of what is good and what is bad about each app When available: The app developer’s contact information, website information, as well as links to pertinent articles about the app Tips and tricks for many of the apps (how to get the most from the app) A brief summary of the positive and negative reviews of the app on Amazon PLUS: A list of 5 must-have free productivity apps that every Kindle Fire owner should install to have greater control over their Kindle Fire A list of 15 free productivity apps that most Kindle Fire owners will find useful since they provide a great deal of functionality Question: OK…But What Types Of Apps, Exactly, Does The Book Include? Answer: A dizzying variety… Game Apps Arcade and Board game apps Mind game apps: Card, logic, and word game apps Kids Apps Educational apps and Game apps for kids: Apps for toddlers, preschoolers, elementary schoolers, and high schoolers in the following categories: Art apps, Book apps, English apps, and Math apps Productivity Apps Art

Mastering Blockchain: Distributed Ledgers, Decentralization and Smart Contracts Explained


Imran Bashir - 2017
    Get to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide

Serious Cryptography: A Practical Introduction to Modern Encryption


Jean-Philippe Aumasson - 2017
    You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.