Programming with Java: A Primer


E. Balagurusamy - 2006
    The language concepts are aptly explained in simple and easy-to-understand style, supported with examples, illustrations and programming and debugging exercises.

Inside Cyber Warfare: Mapping the Cyber Underworld


Jeffrey Carr - 2009
    You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

SEAL of Protection, Collection 2


Susan Stoker - 2016
    He's spent the past nineteen years looking for the serial killer who took his sister from him and ruined his family. Using his connections, and SEAL training, Mozart believes he's finally tracked the killer to the town of Big Bear, California. Summer Pack is working in a crappy motel up at Big Bear Lake until she can find something better, more meaningful, more real. But somewhere in Big Bear, a killer is waiting to strike again. Watching for the perfect victim Protecting Cheyenne- Cheyenne was used to seeing hot military men as she went about her daily business. An anonymous encounter at the grocery store cemented her crush on one such man. Always in control of any situation, Faulkner "Dude" Cooper knows explosives. Disfigured by a bomb while on a mission, he's used to being looked at with pity. When he's called to a local supermarket to assist the local PD, the last thing he expects to find is a generous act of kindness performed by a beautiful, amazing woman. Dude was able to save Cheyenne from the group of thugs trying to take her life, but when the past comes back to haunt them both, sometimes having the knowledge and the desire isn't enough to beat the countdown of the clock. Protecting Jessyka- Kason "Benny" Sawyer was the last single man on his Navy SEAL team, but seeing the love between his friends and their women made it tough to be the odd man out all the time. Jessyka Allen had a good life, until it wasn't anymore. Finding herself in an impossible situation, with no noticeable way out, her job was an escape. Being a SEAL, Benny thought he knew the true meaning of teamwork and friendship. But Jess would show him that everything he thought he knew about sacrifice, trust, and love, paled in comparison to what she brought into his world. Protecting Julie Julie Lytle is working hard to turn her life around. Being kidnapped by sex traffickers changed her drastically, but having grown up the spoiled daughter of a senator, Julie wishes she could've changed just a little sooner. Shamed by her behavior toward the woman rescued alongside her, and further embarrassed and guilt-racked over the way she treated the SEALs who risked their lives on her behalf, Julie is desperate to make amends.

 With help from a D.C. acquaintance who'd endured her own harrowing experience, Julie connects with Patrick Hurt, Commander of the SEALs who'd saved her life. If she can prove she's not the same person who mistreated his team, he'll grant her request to meet them-but not before the protective, sexy man makes a surprising request of his own.

Rotorcraft Flying Handbook


Federal Aviation Administration - 2000
    Most FAA Knowledge Exams’ questions are taken directly from the information presented in these texts.Written for applicants preparing for the private, commercial, or flight instructor certificate with a helicopter or gyroplane class rating, this guide covers both aeronautical knowledge and skill for operating rotorcraft vehicles. It is also a valuable tool for flight instructors as a teaching aid. This is the Basic Helicopter Handbook (Advisory Circular 61-13B) updated and renamed. This is FAA handbook FAA-H-8083-21.

Nomadic Furniture


James Hennessey - 1973
    How to Build and where to Buy Lightweight Furniture that Folds, Collapses, Stacks, Knocks-down, Inflates Or Can be Thrown Away and Re-cycledBeing Both a Book of Instruction and a Catalog of Access for Easy Moving

Free Software, Free Society: Selected Essays


Richard M. Stallman - 2002
    Healso discusses the social aspects of software and how free softwarecan create community and social justice.Given the current turmoil in copyright and patent laws, includingthe DMCA and proposed CBDTPA, these essays are more relevant thanever. Stallman tackles head-on the essential issues driving thecurrent changes in copyright law. He argues that for creativity toflourish, software must be free of inappropriate and overly-broadlegal constraints. Over the past twenty years his arguments andactions have changed the course of software history; this new book issure to impact the future of software and legal policies in the yearsto come.Lawrence Lessig, the author of two well-known books on similar topics,writes the introduction. He is a noted legal expert on copyright lawand a Stanford Law School professor.

The New Hacker's Dictionary


Eric S. Raymond - 1991
    Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.Sample definitionhacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}.The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}).It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.

Architecting for the AWS Cloud: Best Practices (AWS Whitepaper)


Amazon We Services - 2016
    It discusses cloud concepts and highlights various design patterns and best practices. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

Advanced Software Testing, Volume 2: Guide to the Istqb Advanced Certification as an Advanced Test Manager


Rex Black - 2008
    Readers will learn how to define the overall testing goals and strategies for the systems being tested.This hands-on, exercise-rich book provides experience with planning, scheduling, and tracking these tasks. You'll be able to describe and organize the necessary activities as well as learn to select, acquire, and assign adequate resources for testing tasks. Learn how to form, organize, and lead testing teams Master the organizing of communication among the members of the testing teams, and between the testing teams and all the other stakeholders. Additionally, you'll learn how to justify decisions and provide adequate reporting information where applicable.Target Audience: Software Testers, Programmers, System Designers, IT Managers

The National Portrait Gallery History of the Kings and Queens of England


David Williamson - 1991
    His text is enlivened and complemented by a rich selection of images, largely chosen from the holdings of the National Portrait Gallery of London, the definitive collection of pictures on the British monarchy.

Advanced Electronic Communications Systems


Wayne Tomasi - 1987
    Numerous examples throughout provide readers with real-life applications of the concepts of analog and digital communications systems, while chapter-end questions and problems give them a chance to test and review their understanding of fundamental and key topics. Modern digital and data communications systems, microwave radio communications systems, satellite communications systems, and optical fiber communications systems. Cellular and PCS telephone systems coverage presents the latest and most innovative technological advancements being made in cellular communication systems. Optical fiber communications chapter includes new sections on light sources, optical power, optical sources and link budget. Current topics include trellis encoding, CCITT modem recommendations, PCM line speed, extended superframe format, wavelength division multiplexing, Kepler's laws, Clark orbits, limits of visibility, Satellite Radio Navigation and Navstar GPS. For the study of electronic communications systems.

Professional Test Driven Development with C#: Developing Real World Applications with Tdd


James Bender - 2011
    This hands-on guide provides invaluable insight for creating successful test-driven development processes. With source code and examples featured in both C# and .NET, the book walks you through the TDD methodology and shows how it is applied to a real-world application. You'll witness the application built from scratch and details each step that is involved in the development, as well as any problems that were encountered and the solutions that were applied.Clarifies the motivation behind test-driven development (TDD), what it is, and how it works Reviews the various steps involved in developing an application and the testing that is involved prior to implementing the functionality Discusses unit testing and refactoring Professional Test-Driven Development with C# shows you how to create great TDD processes right away.

Code: Version 2.0


Lawrence Lessig - 1999
    Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecture—the very structure of cyberspace itself—will dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know it—intellectual property, free speech, and privacy-—are being threatened and what we can do to protect them. Lessig shows how code—the architecture and law of cyberspace—can make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.