Shooting to Kill: A Wild West Omnibus


Gordon Landsborough - 2016
     QUICK ON THE DRAW Glenister McCreedie was never a lucky man. Imprisoned for a crime he never committed, deserted by the woman he loved and betrayed by his own family. His bad luck seems to be running out when he is released early from prison and finds a job on the railroads. But it doesn’t last long. First he gets into a fight with a man who turns up dead and whilst still on the run, his train is held up by his own brother’s gang. Then he somehow manages to offend the railroad boss’ daughter, the beautiful Elizabeth. With the fates out to get him, Glen has to use all his wits and strength to take control of his own destiny… THE FIGHTING COWBOY Steve Blondel is better known throughout the West as El Cougar – the fighting cowboy. An unbeatable force, he’s winning competitions nationwide and earning a reputation for his skills in the ring. As the first fighting cowboy to come out of the West, Blondel is quickly becoming the one to beat. Huge bets are placed on his success and people travel far and wide to watch him in action. But his career is suddenly interrupted when he learns of the disappearance of his brother, who has mysteriously vanished whilst enroute to a fight. However, it’s not long before Blondel realizes that his brother has been murdered by a gang of vicious train robbers, and his body tossed into the nearby canyon. Blondel vows vengeance, and locates the prime suspects of the attack – the infamous Morton family – who will stop at nothing to get what they want... BATTLE AT BROKEN KNEE Trouble always seems to find Careless O’Connor. But when he comes across a wrecked wagon off a lonely Texan trail, dangerously close to the volatile Mexican border, he has little premonition that this chance encounter will change his life forever. Lying amongst the debris of shattered wagon wheels and dead horses is the woman who will turn Careless’ world upside down. Little did he know the plight of Grace Whitfield, with her blue eyes, blonde curls and fierce desire to avenge the ruthless imprisonment of her brother, was going to lead Careless on many an adventure – both in the harsh desert and in his heart. Battling against terrifying odds, Careless and his crew – the beautiful Grace, brave young Yippee Clay, honest Burt and dastardly Big Mouth – struggle on in their quest for justice. Praise for Gordon Landsborough 'A punchy tale coupled with plenty of action - an engaging read!' - Philip McCormac, bestselling western author 'A must-read collection of western adventures.' – Tom Kasey, bestselling author of Trade Off. Gordon Landsborough (1913-1984) was a publisher, author and bookseller. Writing tales about the exploits of gun-toting cowboys fighting out on the arid sands of the Wild West, Landsborough was himself a pioneer in the English paperback publishing world of the 1950s. He was widely known amongst his peers as the ‘maverick publishing genius’.

Beyond the Twelve-Factor App Exploring the DNA of Highly Scalable, Resilient Cloud Applications


Kevin Hoffman - 2016
    Cloud computing is rapidly transitioning from a niche technology embraced by startups and tech-forward companies to the foundation upon which enterprise systems build their future. In order to compete in today’s marketplace, organizations large and small are embracing cloud architectures and practices.

RabbitMQ in Action: Distributed Messaging for Everyone


Alvaro Videla - 2012
    It starts by explaining how message queuing works, its history, and how RabbitMQ fits in. Then it shows you real-world examples you can apply to your own scalability and interoperability challenges.About the TechnologyThere's a virtual switchboard at the core of most large applications where messages race between servers, programs, and services. RabbitMQ is an efficient and easy-to-deploy queue that handles this message traffic effortlessly in all situations, from web startups to massive enterprise systems.About the BookRabbitMQ in Action teaches you to build and manage scalable applications in multiple languages using the RabbitMQ messaging server. It's a snap to get started. You'll learn how message queuing works and how RabbitMQ fits in. Then, you'll explore practical scalability and interoperability issues through many examples. By the end, you'll know how to make Rabbit run like a well-oiled machine in a 24 x 7 x 365 environment.Written for developers familiar with Python, PHP, Java, .NET, or any other modern programming language. No RabbitMQ experience required. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book. What's InsideLearn fundamental messaging design patternsUse patterns for on-demand scalabilityGlue a PHP frontend to a backend written in anythingImplement a PubSub-alerting service in 30 minutes flatConfigure RabbitMQ's built-in clusteringMonitor, manage, extend, and tune RabbitMQ========================================​====Table of ContentsPulling RabbitMQ out of the hatUnderstanding messagingRunning and administering RabbitSolving problems with Rabbit: coding and patternsClustering and dealing with failureWriting code that survives failureWarrens and Shovels: failover and replicationAdministering RabbitMQ from the WebControlling Rabbit with the REST APIMonitoring: Houston, we have a problemSupercharging and securing your RabbitSmart Rabbits: extending RabbitMQ

Version Control By Example


Eric Sink - 2011
    Topics covered include:Basic version control commands and conceptsIntroduction to Distributed Version Control Systems (DVCS)Advanced branching workflowsStrengths and weaknesses of DVCS vs. centralized toolsBest practicesHow distributed version control works under the hoodFeaturing these open source version control tools:Apache SubversionMercurialGitVeracity

Debug It!: Find, Repair, and Prevent Bugs in Your Code


Paul Butcher - 2009
    Others have the knack of unerringly zeroing in on the root cause of a bug. Are they geniuses? Just lucky? No, they've learned the secrets of professional debugging. This book will equip you with the tools, techniques and approaches-proven in the crucible of professional software development-to ensure that you can tackle any bug with confidence. You'll learn how to handle every stage of the bug life-cycle, from constructing software that makes debugging easy, through detection, reproduction, diagnosis and rolling out your eventual fix. If you develop software, sooner or later you're going to discover that it doesn't always behave as you intended. Working out why it's misbehaving can be hard. Sometimes very hard. Debug It! is here to help! All bugs are different: there is no silver bullet. You've got to rely upon your intellect, intuition, detective skills and yes, even a little luck. But that doesn't mean that you're completely on your own-there is much you can learn from those who have gone before. This book distills decades of hard-won experience gained in the trenches of professional software development, giving you a head-start and arming you with the tools you need to get to the bottom of the problem, whatever you're faced with. Whether you're writing Java or assembly language, targeting servers or embedded micro-controllers, using agile or traditional approaches, the same basic bug-fixing principles apply. From constructing software that is easy to debug (and incidentally less likely to contain bugs in the first place), through handling bug reports to rolling out your ultimate fix, we'll cover the entire life-cycle of a bug. You'll learn about the empirical approach, which leverages your software's unique ability to show you what's really happening, the importance of finding a reliable and convenient means of reproducing a bug, and common pitfalls so you can avoid them. You'll see how to use commonly available tools to automatically detect problems before they're reported by customers and how to construct "transparent software" that provides access to critical information and internal state.

Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)


Andy Oram - 2009
    Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).

Getting Started with SQL: A Hands-On Approach for Beginners


Thomas Nield - 2016
    If you're a business or IT professional, this short hands-on guide teaches you how to pull and transform data with SQL in significant ways. You will quickly master the fundamentals of SQL and learn how to create your own databases.Author Thomas Nield provides exercises throughout the book to help you practice your newfound SQL skills at home, without having to use a database server environment. Not only will you learn how to use key SQL statements to find and manipulate your data, but you'll also discover how to efficiently design and manage databases to meet your needs.You'll also learn how to:Explore relational databases, including lightweight and centralized modelsUse SQLite and SQLiteStudio to create lightweight databases in minutesQuery and transform data in meaningful ways by using SELECT, WHERE, GROUP BY, and ORDER BYJoin tables to get a more complete view of your business dataBuild your own tables and centralized databases by using normalized design principlesManage data by learning how to INSERT, DELETE, and UPDATE records