Book picks similar to
Information Security: The Complete Reference by Mark Rhodes-Ousley
work
shopping-list
tech-bookshelf
work-stuff
Computer Graphics: Principles and Practice
James D. Foley - 1990
It details programming with SRGP, a simple but powerful raster graphics package. Important algorithms in 2D and 3D graphics are detailed for easy implementation, and a thorough presentation of the mathematical principles of geometric transformations and viewing are included.
C Primer Plus
Stephen Prata - 1984
From extended integer types and compound literals to Boolean support and variable-length arrays, this book helps you learn to create practical and real-world applications with C programming. It contains review questions and programming exercises.
Programming Entity Framework: DbContext
Julia Lerman - 2011
This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database
Modern Database Management
Jeffrey A. Hoffer - 1994
Intended for professional development programs in introductory database management.
C: A Reference Manual
Samuel P. Harbison III - 1984
It discusses the ongoing, international standardization of C++, explores the importance of Clean C code in the common subset of the ISO C and C++ languages, and demonstrates other ways to program in a style that is more compatible with C++.
iPad: The Missing Manual
J.D. Biersdorfer - 2010
That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.
ZooKeeper: Distributed process coordination
Flavio Junqueira - 2013
This practical guide shows how Apache ZooKeeper helps you manage distributed systems, so you can focus mainly on application logic. Even with ZooKeeper, implementing coordination tasks is not trivial, but this book provides good practices to give you a head start, and points out caveats that developers and administrators alike need to watch for along the way.In three separate sections, ZooKeeper contributors Flavio Junqueira and Benjamin Reed introduce the principles of distributed systems, provide ZooKeeper programming techniques, and include the information you need to administer this service.Learn how ZooKeeper solves common coordination tasksExplore the ZooKeeper API’s Java and C implementations and how they differUse methods to track and react to ZooKeeper state changesHandle failures of the network, application processes, and ZooKeeper itselfLearn about ZooKeeper’s trickier aspects dealing with concurrency, ordering, and configurationUse the Curator high-level interface for connection managementBecome familiar with ZooKeeper internals and administration tools
Web Copy That Sells: The Revolutionary Formula for Creating Killer Copy Every Time
Maria Veloso - 2004
Simply put, what works in the brick-and-mortar world does not necessarily grab Web shoppers. Companies selling products and services online need to promote their wares with engaging copy that grabs attention and compels Web site visitors to buy.Web Copy That Sells presents copy strategies that have been proven time and again in the e-commerce arena. Maria Veloso, perhaps the most widely acclaimed Web copywriter in the world, reveals her revolutionary approach based on five simple questions, which, when answered, make the copy practically write itself. Veloso crams all the information from her 12-hour, $997 live seminars into a comprehensive book that will help any Web copywriter:* write sizzling and irresistible Web copy, e-mails, and marketing communications* quickly turn lackluster sites into ""perpetual money machines""* use Neuro-Linguistic Programming and psychological tactics to compel Web surfers to buy* avoid the top three blunders that can wipe out your sales* convert up to 50% of online prospects into paying customers* and more!"
Kotlin for Android Developers: Learn Kotlin the easy way while developing an Android App
Antonio Leiva - 2016
Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)
John Mongan - 2000
This classic book uncovers what interviews are really like at America's top software and computer companies and provides you with the tools to succeed in any situation. The authors take you step-by-step through new problems and complex brainteasers they were asked during recent technical interviews. 50 interview scenarios are presented along with in-depth analysis of the possible solutions. The problem-solving process is clearly illustrated so you'll be able to easily apply what you've learned during crunch time. You'll also find expert tips on what questions to ask, how to approach a problem, and how to recover if you become stuck. All of this will help you ace the interview and get the job you want.What you will learn from this bookTips for effectively completing the job application Ways to prepare for the entire programming interview process How to find the kind of programming job that fits you best Strategies for choosing a solution and what your approach says about you How to improve your interviewing skills so that you can respond to any question or situation Techniques for solving knowledge-based problems, logic puzzles, and programming problems Who this book is for This book is for programmers and developers applying for jobs in the software industry or in IT departments of major corporations.Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
25 Real Estate Lead Generating Strategies That Work
Greg Reed - 2014
Well ‘next’ might be exaggerating it a little. A sale would be more appropriate. Each night I’d return home and let out a bunch of expletives that would make my dog blush. I was often in a foul mood. Then after 10 years of struggle I discovered, developed and implemented a bunch of real estate marketing strategies which I am going reveal in this book that saw my income virtually double in one year. After 2 years of using these real estate lead generation skills my income shot up another 50%. The word soon got out that I had discovered a way to make ‘easy’ (no such thing) real estate sales. Real estate referrals became my method of operation. Companies were approaching me to move camps. In fact one company placed me on a $200,000 package to help boost sales. The strategies worked for me and they’ll work for you. This book is for real estate sales people, real estate agents or brokers who are totally overwhelmed with the complexities of selling real estate. It’s for agents seething with frustration at their pathetic sales. And it’s also for successful real estate agents wanting to take their real estate career to the next level. You have two obstacles from making a killing in real estate sales: 1. You have no idea what business you are REALLY in. Most real estate sales people think that they are in the real estate business to assist people with their real estate buying, selling, leasing or managing needs.While partly ‘true’ unless you have a real estate lead that wants to buy, sell, lease or manage a property through you, you have no business. PERIOD. 2. A belief that you are ‘Gods’ answer to all things real estate.Let’s face it. Real estate agents are an egotistical bunch. How often do you see advertisements stating “Billy Blogs – No. 1 For XYZ Real Estate” or “Cheryl Champion – Top Real Estate Marketer, Mars Tribune” Who gives a toss. The public certainly don’t and nor should you especially if you are a newbie just getting started. With my real estate lead generation tips you’ll soon be the ‘king’ or queen’ of your local area. My real estate lead generation strategies are by no means complete. But they are a good start in raising you from the depths of despair to making you the champion agent you so rightly deserve to be. Here’s my appeal to you. Believe in yourself. Believe in your real estate career. Follow my suggestions. Implement those that appeal to you and be consistent. These real estate lead generation strategies take time but they have helped me sell over $400 million of real estate. They will work for you to.
Embedded Android: Porting, Extending, and Customizing
Karim Yaghmour - 2011
You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.
Getting Started with OAuth 2.0
Ryan Boyd - 2011
This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system
Principles of Information Security
Michael E. Whitman - 2002
Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.