Rick Steves Snapshot Sevilla, Granada & Andalucía


Rick Steves - 2009
    In this compact guide, Rick Steves covers the best of Granada, Sevilla, Córdoba, Andalucía, and Spain's southern coast. With Rick's helpful hints, you'll learn how to get a reservation for the Alhambra and where to dance the Flamenco in Sevilla. You'll get Rick's firsthand advice on the best sights, eating, sleeping, and nightlife, and the maps and self-guided tours will ensure you make the most of your experience. More than just reviews and directions, a Rick Steves Snapshot guide is a tour guide in your pocket.Rick Steves Snapshot guides consist of excerpted chapters from Rick Steves European country guidebooks. Snapshot guides are a great choice for travelers visiting a specific city or region, rather than multiple European destinations. These slim guides offer all of Rick's up-to-date advice on what sights are worth your time and money. They include good-value hotel and restaurant recommendations, with no introductory information (such as overall trip planning, when to go, and travel practicalities).

Java Persistence with Hibernate: Revised Edition of Hibernate in Action


Christian Bauer - 2006
    Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping making it a snap to work with SQL databases in Java applications. Hibernate applications are cheaper, more portable, and more resilient to change. Because it conforms to the new EJB 3.0 and Java Persistence 1.0 standard, Hibernate allows the developer to seamlessly create efficient, scalable Java EE applications.Java Persistence with Hibernate explores Hibernate by developing an application that ties together hundreds of individual examples. You'll immediately dig into the rich programming model of Hibernate 3.2 and Java Persistence, working through queries, fetching strategies, caching, transactions, conversations, and more. You'll also appreciate the well-illustrated discussion of best practices in database design, object/relational mapping, and optimization techniques.In this revised edition of the bestselling Hibernate in Action, authors Christian Bauer and Gavin King-the founder of the Hibernate project-cover Hibernate 3.2 in detail along with the EJB 3.0 and Java Persistence standard.

Electronic Devices (Conventional Current Version)


Thomas L. Floyd - 1984
    Floyd is well known for straightforward, understandable explanations of complex concepts, as well as for non-technical, on-target treatment of mathematics. The extensive use of examples, Multisim simulations, and graphical illustrations makes even complex concepts understandable. From discrete components, to linear integrated circuits, to programmable analog devices, this books¿ coverage is well balanced between discrete and integrated circuits. Also includes focus on power amplifiers; BJT and FET amplifiers; advanced integrated circuits–instrumentation and isolation amplifiers; OTAs; log/antilog amplifiers; and converters. Thorough coverage of optical topics–high intensity LEDs and fiber optics. Devices sections on differential amplifiers and the IGBT (insulated gate bipolar transistor) are now included. For electronics technicians.

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

MySQL


Paul DuBois - 1999
    As an important contributor to the online documentation for MySQL, Paul uses his day-to-day experience answering questions users post on the MySQL mailing list to pinpoint the problems most users and administrators encounter. The principal MySQL developer, Monty Widenius, along with a network of his fellow developers, reviewed the manuscript, providing Paul with the kind of insight no one else could supply. Instead of merely giving you a general overview of MySQL, Paul teaches you how to make the most of its capabilities. Through two sample databases that run throughout the book, he gives you solutions to problems you'll likely face. He helps you integrate MySQL efficiently with third-party tools, such as PHP and Perl, enabling you to generate dynamic Web pages through database queries. He also teaches you to write programs that access MySQL databases.

CSS Mastery: Advanced Web Standards Solutions


Andy Budd - 2006
    You'll learn how to: - Plan, organize, and maintain your stylesheets more effectively- Apply the secrets of liquid, elastic, and hybrid layouts- Create flickr-style image maps, remote rollovers, and other advanced CSS features- Lay out forms using pure CSS- Recognize common browser bugs, and how to fix themWhile CSS is a relatively simple technology to learn, it is a difficult one to master. When you first start developing sites using CSS, you will come across all kinds of infuriating browser bugs and inconsistencies. It sometimes feels like there are a million and one different techniques to master, spread across a bewildering array of websites. The range of possibilities seems endless and makes for a steep and daunting learning curve. By bringing all of the latest tips, tricks, and techniques together in one handy reference, this book demystifies the secrets of CSS and makes the journey to CSS mastery as simple and painless as possible. While most books concentrate on basic skills, this one is different, assuming that you already know the basics and why you should be using CSS in your work, and concentrating mainly on advanced techniques. It begins with a brief recap of CSS fundamentals such as the importance of meaningful markup, how to structure and maintain your code, and how the CSS layout model really works. With the basics out of the way, each subsequent chapter details a particular aspect of CSS-based design. Through a series of easy-to-follow tutorials, you will learn practical CSS techniques you can immediately start using in your daily work. Browser inconsistencies are the thorn in most CSS developers' sides, so we have dedicated two whole chapters to CSS hacks, filters, and bug fixing, as well as looking at image replacement; professional link, form, and list styling; pure CSS layouts; and much more. All of these techniques are then put into practice in two beautifully designed case studies, written by two of the world's best CSS designers, Simon Collison and Cameron Moll. Summary of Contents: - Chapter 1: Setting the Foundations- Chapter 2: Visual Formatting Model Recap- Chapter 3: Background Images and Image Replacement- Chapter 4: Styling Links- Chapter 5: Styling Lists and Creating Nav Bars- Chapter 6: Styling Forms and Data Tables- Chapter 7: Layout- Chapter 8: Hacks and Filters- Chapter 9: Bugs and Bug Fixing- Case Study 1: More Than Doodles- Case Study 2: Tuscany Luxury Resorts

Date Like A Man


Myreah Moore - 2001
    According to Myreah Moore -- "America's Dating Coach" -- women need to start dating to have fun, which is what men have been doing for ages! In fact, Moore says, dating is a lot like a science. And with any scientific experiment, it's trial and error. In Date Like a Man, she steals dating secrets from men (the masters of dating) and transforms them into a personal training program that will boost your dating prospects -- and increase your chances of finding a soul mate.Clear, candid, and empowering, Date Like a Man makes the manhunt fun -- the way it should be. Even if you think you're a dating expert, you'll devour this manual -- the new bible for surviving and thriving in today's world.

Chemistry and Chemical Reactivity (with General ChemistryNOW CD-ROM)


John C. Kotz - 1987
    This revision includes General ChemistryNow, a new CD-ROM and web-based learning system that focuses on goals, connections, and complete integration with the text.

Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)


Artemis Caro - 2017
    As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn: A Brief History of Blockchain Technology Blockchain Basics: Managing Digital Transactions What is a Distributed Ledger? Blockchain Beyond Bitcoin Implications Of Blockchain: Big Data, Privacy & Personal Data Profiting from Blockchain Technologies Limitations & Challenges of Blockchain The Future of Blockchain For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets. This is ALL About To Change... Make sure you take action and join the Financial Revolution by reading this book!

Google Hacking: An Ethical Hacking Guide To Google


Ankit Fadia - 2007
    Google Hacking teaches people how to get the most out of this revolutionary search engine. Not only will this book teach readers how Google works, but it will also empower them with the necessary skills to make their everyday searches easier, more efficient, and more productive. Google Hacking also demonstrates how Google can be used for negative means. It's immense searching power, means that everyone, including cyber criminals, can feasibly access confidential data, such as company presentations, budgets, blueprints, even credit card numbers, with just the click of a mouse. Using numerous examples, case studies, and screenshots, this book explains the art of ethical Google Hacking -- it not only teaches readers how Google works, but it provides them with the knowledge they need to protect their data and systems from getting Google Hacked. This is the only book you need to maximize (and protect yourself) from Google searches!

When Nothing Matters Anymore: A Survival Guide for Depressed Teens


Bev Cobain - 1998
    Bev Cobain is the cousin of Kurt, the rock star who took his own life in 1994.

Political Savvy: Systematic Approaches to Leadership Behind-The-Scenes


Joel R. Deluca - 1992
    They take initiative, and they forge consensus. Ultimately, they help others maximize their impact, so the organization can continue to thrive in a highly competitive future. Insprirational leadership without a firm grounding in organization politics risks becoming hollow rhetoric. Political Savvy discusses how successful leaders at all levels in the organization operate ethically behind-the-scenes to work the darker side of organizational life. The book helps you analyze your own political style, (yes, everyone has one) and understand the strategies and tactics used by ethical leaders. Through quotes, grids, tools, a case study, mapping techniques and examples, the book provides a systematic, practical guide to navigating political minefields so you can increase your influence in the organization, coach others, and obtain the career success, satisfaction, and meaning you want from work.

Calculus


Ron Larson - 1999
    It has been widely praised by a generation of users for its solid and effective pedagogy that addresses the needs of a broad range of teaching and learning styles and environments. Each title is just one component in a comprehensive calculus course program that carefully integrates and coordinates print, media, and technology products for successful teaching and learning.

The Mindset


Ace Bowers - 2019
    He was forced to choose which path he was going to take: continue the cycle of family poverty or break it. The Mindset is an inspirational memoir of Ace Bowers’ personal transformation from janitor to millionaire. Bowers began his journey uneducated, overweight, addicted to cigarettes, in debt, and depressed. Revealing the skeletons in his closet for the first time set the scene for how he got to the point of cleaning a motel for $6 an hour. Bowers’ detailed accounts of his turbulent and traumatizing childhood illustrated what it is like growing up in a poor, alcoholic, and abusive family. The metamorphosis began as soon as he changed his mindset. Within five years, Bowers was able to completely turn his life around, going from trash to technology. This memoir illuminates step by step his unconventional path to wealth, health, and happiness.

The Windows Command Line Beginner's Guide (Computer Beginner's Guides)


Jonathan Moeller - 2011
    The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.