CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

McIntyre Security Bodyguard Series - Box Set 1


April Wilson - 2017
     Book 1: Vulnerable Beth Jamison had a rough start in life. She survived a childhood abduction, but her emotionally traumatic past still haunts her, and she suffers from anxiety and issues with intimacy. She doesn't know it, but the man who kidnapped her has just been released early from prison. Now she has secret bodyguards keeping her safe 24/7. When CEO Shane McIntyre meets Beth, their mutual attraction is instant and intense, and Shane falls hard for Beth. Shane has his work cut out for him if he’s going to gain her trust before it’s too late. This alpha protector is determined to keep Beth safe and make her his. Book 2: Fearless Beth Jamison - Since childhood, I’ve lived under a shadow of fear and anxiety, afraid to trust anyone. All that changed when I met Shane. He's my lover, my protector, and my best friend. He's also my avenger. He taught me to cope with my fears. He gave me the courage to let someone in. But the threat’s still out there, and it’s coming back for me. I know Shane won’t let him get me this time, but at what cost? I can’t lose Shane. I just can’t. Book 2.5: Shane (a novella) Shane is a 26,000-word novella that retells the ending of Fearless from Shane's point of view, plus some additional material. Shane McIntyre will do anything to protect the love of his life. Even kill a monster. When convicted kidnapper Howard Kline comes after Beth Jamison to exact revenge for his two decades spent in prison, Shane will be waiting for him, ready to put an end to Beth's nightmare once and for all. Book 3: Broken Lia McIntyre - As a 22-year-old female professional bodyguard, Lia’s a rarity in a male-dominated field. She may be a petite, cute blond, but she’s a master of martial arts and Krav Maga, and she can render a man twice her size unconscious in just seconds. Lia hides a painful past behind a snarky, take-no-prisoners attitude. She was horribly betrayed by her first love, and she’s determined never to let anyone use her or hurt her again. To make sure that never happens again, she’s got rules. One, never sleep with a client. And two, never sleep with the same guy twice. The walls she’s built up to protect herself are rock solid. Until she meets her new client, Jonah Locke, a swoon-worthy rock star with a heart of gold. Jonah Locke - Jonah Locke is the front man for the most popular rock band in the United States. His band dominates the charts, and he’s constantly hounded by crowds of fan-girls and paparazzi. The guy can’t sneeze without everyone on social media knowing. A bad break-up with the Queen of Pop sends him from LA to Chicago, where he just wants to lie low and write new songs. Unfortunately, trouble follows him to Chicago. When he meets his new bodyguard, he falls hard for her. But lust transforms into something more when he gets to know the woman beneath the kick-ass shell.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Manifesto: A Revolutionary Approach to General Aviation Maintenance


Mike Busch - 2014
    Written in typical no-nonsense style, it lays out the basis of Mike's “minimalist” maintenance philosophy for owner-flown general aviation aircraft. An owner who follows the book's guidance can save a small fortune on maintenance costs and end up with a safer, more reliable aircraft.Owners are advised to perform the absolute least amount of maintenance required to make their aircraft safe, reliable and legal… and nothing more. The book explains in detail why engine and propeller TBOs and most other manufacturer-prescribed maintenance intervals should be disregarded. And “Manifesto” explains exactly how to do it.About the Author:Mike Busch is arguably the best-known A&P/IA in general aviation. In 2008, he was honored by the FAA as “National Aviation Maintenance Technician of the Year.” Mike has been a prolific aviation writer for more than four decades. His “Savvy Aviator” columns have appeared in numerous publications including EAA Sport Aviation, AOPA’s Opinion Leader’s Blog, AVweb, and magazines for the three largest GA type clubs (ABS, CPA, and COPA). He is renowned for his free monthly maintenance webinars and his standing-room-only forums at EAA AirVenture Oshkosh. Mike has been a pilot and aircraft owner for 45 years with 7,500+ hours logged, and he is a CFIA/I/ME. He’s founder and CEO of Savvy Aircraft Maintenance Management, Inc., the world’s largest firm providing maintenance-management services for owner-flown aircraft.

Brookland Security


Clara Kendrick - 2017
    Lots of suspense, mystery, and romance. No cliffhangers! Protecting Faun When Faun moves away from the big city to start up her very own cafe in the middle of nowhere, she thinks she's left her stalker behind her. Her sister doesn't think so and employs the local security firm to watch over things. When thinks start getting broken and Faun believes she is being watched, she becomes grateful for the steady, confident presence of Randal Brookland, owner of Brookland security. Randal becomes sure that what is hunting Faun isn't human. It's a good thing that he isn't human either. Can this cowboy werewolf protect the woman that he comes to love? Bear Dreams Growing up, Tiffany Bowman wanted for nothing. But she desperately wanted to make a name for herself outside of her father's business of selling artifacts as unique as they are rare. When her father recieves a blackmail note that shows Tiffany is in the cross hairs Orson has to take on the job of keeping her safe. Orson, werebear and former military, can't keep memories of his old unit being taken out at bay. Can he keep the woman he doesn't want to like safe? Can he admit to himself that he is falling for this princess of fashion? In the Eye of the Tiger Leon Nmir loves women, and they love him too, but when prickly detective Eloise Barlow gets under his skin he realizes that no one but her will do. Eloise has no interest in repeating a one night incident with Leon, even when it becomes clear that single night is going to give her nine months of problems, nameless becoming princess of the Nmir Tiger Clan. When a vengeful Oni targets Eloise Leon must put every skill he has as an agent of security to work to keep the woman he is falling in love with safe. Siren's Song All Serena has ever wanted to do was sing. She knows that being a hopeful star comes with risks, and even takes the weird messages she gets after achieving some social media notoriety in stride. But can she handle it when her own strange musical gifts start to awaken? Uther has spent a millennia as a dragon trapped in a human body, with his gifts limited by a witches curse. Will being half the dragon he was be enough to keep the naggingly charming Serena safe while a super fan becomes criminally obsessed? The Raven's Heart When Adelle Harper loses her job as the top CEO of Harper Industries she thinks it's the worst thing that could happen. That is, of course, until someone starts writing strange symbols and leaving dead animals in her upper New York home. Adelle has to turn to biker bad boy Bran Quinn to keep her safe when her life turns from the mundane to the magical. Who is trying to kill her? And can they stop it in time?

Dissecting The Hack: The F0rb1dd3n Network


Jayson E. Street - 2009
    One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Ascension Series: Books 1-3


Ken Lozito - 2016
    Now they need our help... A hacker makes one of the biggest discoveries that will forever change the world. A NASA pilot whose secret abilities may be the key to humanity’s survival. Kept secret for 60 years, the discovery of an alien signal forces an unlikely team to investigate a mysterious structure discovered in the furthest reaches of the solar system. Join the crew of the Athena, Earth’s most advanced space ship on the ultimate journey beyond our wildest imagining. Strap yourself in. The Ascension series: Books 1 - 3 includes the first three books in this action-packed space opera series. Readers describe them as “a cross between David Weber and John Ringo.” If you like space opera adventure stories with clever heroes, impossible situations, and chilling discoveries, then you’re in for a fun nonstop thrill ride. 800+ pages. Find out why thousands of readers have fallen for Ken Lozito’s thrilling series! Buy the box set to get three books you won’t want to put down!

Mastering Algorithms with C


Kyle Loudon - 1999
    Mastering Algorithms with C offers you a unique combination of theoretical background and working code. With robust solutions for everyday programming tasks, this book avoids the abstract style of most classic data structures and algorithms texts, but still provides all of the information you need to understand the purpose and use of common programming techniques.Implementations, as well as interesting, real-world examples of each data structure and algorithm, are included.Using both a programming style and a writing style that are exceptionally clean, Kyle Loudon shows you how to use such essential data structures as lists, stacks, queues, sets, trees, heaps, priority queues, and graphs. He explains how to use algorithms for sorting, searching, numerical analysis, data compression, data encryption, common graph problems, and computational geometry. And he describes the relative efficiency of all implementations. The compression and encryption chapters not only give you working code for reasonably efficient solutions, they offer explanations of concepts in an approachable manner for people who never have had the time or expertise to study them in depth.Anyone with a basic understanding of the C language can use this book. In order to provide maintainable and extendible code, an extra level of abstraction (such as pointers to functions) is used in examples where appropriate. Understanding that these techniques may be unfamiliar to some programmers, Loudon explains them clearly in the introductory chapters.Contents include:PointersRecursionAnalysis of algorithmsData structures (lists, stacks, queues, sets, hash tables, trees, heaps, priority queues, graphs)Sorting and searchingNumerical methodsData compressionData encryptionGraph algorithmsGeometric algorithms

A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace


Liliana Hart - 2019
     Bayleigh Scott has no idea who her new neighbor is, only that her body is drawn to him in ways she can’t explain, and the danger that surrounds him isn’t the deterrent she knows it should be. More than fireworks explode between Cade and Bayleigh when she discovers the real reason he relentlessly pursued her, but by then it’s too late, because she’s already been drawn into a deadly game of desire, deception and revenge. SHADOWS AND SILK Agent Brant Scott knows when a battle is lost. He’s been an integral part of hunting down members of the del Fuego cartel for years, but it’s not the violent criminals that have the ability to bring him to his knees. That honor belongs to one woman. And after spending a night in Darcy MacKenzie’s bed, he knows he has to disappear from her life or risk her finding out the one secret that can make her despise him forever. Darcy MacKenzie is hell on wheels. At least that’s what her brothers tell her. And when she has the chance to work with the elite team assigned to destroy the most dangerous drug cartel in the world, she jumps at the chance to lend her expertise by deciphering the Mayan hieroglyphs the cartel is using to send messages. The only problem is her partner is none other that Brant Scott—the only man she’s ever loved and the one who left her without a backward glance. With secrets of her own—and a body built for sin—Darcy is more than an equal match for the stubborn Brant. But loving each other could be more of a risk than either is willing to take. SECRETS AND SATIN No one knows heartbreak like Jade Jax. After losing her husband to a tragic death, she doesn’t believe love can happen twice. But after years of living a half-life without her husband, her body starts to waken again, and needs she’d forgotten come to the surface. Max Devlin never thought Jade would want him outside of his dreams, but fate plays a helping hand when they’re thrust into a high stakes mission, protecting each other’s backs like old times. Max decides he’s finally ready to end his bachelor ways, but he learns quickly that happily-ever-after isn't always possible. Because Jade has no desire to ever love again. Not when she knows how painful it can be. SINS AND SCARLET LACE Declan MacKenzie has loved the same woman for as long as he can remember, but after a mission early on in his career turns deadly, he realizes he can never have a wife or family and keep them safe. So he watches her marry another man. Sophia Huxley is involved in a nightmare. Her late husband has been labeled a traitor and he's made her the fall guy. There's no one she can call to prove her innocence. Except the man who broke her heart.

MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements


Dan HolmeMelissa Craft - 2003
    Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only

Shadow Force: Complete 5-Part Series


Camilla Blake - 2021
    No cliffhangers. Epic action, drama, suspense, clean romance, and happy ever afters. Highly rated authors.PART ONE: Shadow PromiseCade Montgomery will always carry the guilt for the men who died on his watch, and he will stop at nothing to find the people responsible. When Piper Collins, his former foster sister and the woman who stole his heart more than ten years ago, resurfaces, things get complicated.Piper Collins left the FBI after her fiancé died three years ago, to find his killer. That search leads her to Atlanta and back to Cade, the man who broke her heart when he left and never returned. When Cade meets with two men who are working for a known drug lord at the bar where she’s working undercover, Piper is disappointed to find he turned to a life of crime instead of being the man of conviction she used to know. But things aren’t adding up, and Piper hopes that, with his help, her fiancé’s killer will be brought to justice.PART TWO: Shadow SecretCruz Ortiz is no longer the man he used to be. After being taken hostage and almost beaten to death by a Venezuelan drug lord, Cruz joins Shadow Force with a new face, a new identity, and a death certificate for his old self. When Shadow Force is tasked with sending someone in undercover, Cruz is the obvious choice.Lydia Ayala is content with her life as a nurse practitioner in the slums of Miami. Sure, her patients tend to be gang members and drug dealers, but she’s confident she’s making a difference in the world. When she’s kidnapped and forced into a marriage, she plans to find a way out of the death sentence. But Cruz Ortiz keeps a watchful eye on her, and her chances to make a break are growing smaller, while the wedding is drawing closer.PART THREE: Shadow FlightRyder Blake is grateful Shadow Force scooped him up before he died a slow death at his desk at the CIA headquarters. After running for his life during a long-term undercover op, Ryder is convinced he’s put his clandestine days behind him. But when a large shipment of drugs and guns goes missing and the Russian Mafia boss who tried to have him killed is implicated, Ryder agrees to take on his old persona and enter a string of underground fights. Only, Jolie Phillips, the office manager for Shadow Force and a woman determined to be an operative, is assigned to the case with him, and Ryder is not a happy camper.A new organization comes to light as Ryder and Jolie travel around the southeast. As they get closer to the answers, the danger escalates, and Ryder and Jolie are running for their lives.PART FOUR: Shadow RescueFormer army and explosives expert Oscar Cortada is rumored to have one or two screws loose due to his infatuation with making things go Boom! But when he and the team stumble upon a container of women, Oscar is tormented by his memories. Oscar volunteers for the job to help Shadow Force uncover the missing people.Ivy Bell never stopped loving her husband while she pursued a career in acting and modeling. Still, after eleven years apart, it seemed they would never find their way back to each other. But when a new role opens up in Atlanta and Ivy arrives on set, she realizes things aren’t what they seem.PART FIVE: Shadow RedemptionLevi Slater has fought crime since his time with the DEA, but never before has he encountered a more evil and sinister group than the Los Caballeros del Camino, The Knights of the Way.Dr. Drew Bellamy has one objective: keep her son safe. But when she’s taken from outside her home and given an ultimatum, she finds herself scrambling and forcing her way out of captivity. When she runs smack into Levi Slater in the woods outside the compound where she was held, she faces a decision—trust him with her and her son’s life or go it alone.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions


Johnny Cache - 2007
    Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

Production and Operations Management


K. Aswathappa - 2009
    Chapter 1: Introduction to Production and Operations Management Chapter 2: Strategic Operations Management Chapter 3: Production Processes, Manufacturing and Service Operations Chapter 4: Design of Production Systems Chapter 5: Manufacturing Technology Chapter 6: Long-Range Capacity Planning Chapter 7: Facility Location Chapter 8: Facility Layout Chapter 9: Design of Work Systems Chapter 10: Production/Operations Planning and Control Chapter 10: Aggregate Planning and Master Production Scheduling Chapter 11: Resource Requirement Planning Chapter 13: Shop Floor Planning and Control Chapter 14: Quality Management Chapter 15: Maintenance Management Chapter 16: Introduction to Materials Management Chapter 17: Inventory Management Chapter 18: JustlnTime Systems Chapter 19: Logistics and Supply Chain Management Index 557564