Electronic Commerce
Gary P. Schneider - 1999
ELECTRONIC COMMERCE, EIGHTH EDITION covers emerging online technologies and trends and their influence on the electronic commerce marketplace.
Digital Integrated Circuits
Jan M. Rabaey - 1995
Digital Integrated Circuits maintains a consistent, logical flow of subject matter throughout. KEY TOPICS: Addresses today's most significant and compelling industry topics, including: the impact of interconnect, design for low power, issues in timing and clocking, design methodologies, and the tremendous effect of design automation on the digital design perspective. MARKET: For readers interested in digital circuit design.
Are You Smart Enough to Work at Google?
William Poundstone - 2012
The blades start moving in 60 seconds. What do you do? If you want to work at Google, or any of America's best companies, you need to have an answer to this and other puzzling questions. Are You Smart Enough to Work at Google? guides readers through the surprising solutions to dozens of the most challenging interview questions. The book covers the importance of creative thinking, ways to get a leg up on the competition, what your Facebook page says about you, and much more. Are You Smart Enough to Work at Google? is a must-read for anyone who wants to succeed in today's job market.
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Kraig Brockschmidt - 2012
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.
Running Science
Owen Anderson - 2013
His U.S. counterpart, Bill Bowerman, brought Lydiard's term for what until then had been called roadwork, or jogging, to the States. Soon after, the 1970s running boom started, spurred by exercise-advocating research from the growing fields of exercise science and sports medicine and from enthusiasts such as Jim Fixx, author of The Complete Book of Running. One of Bowerman's former runners at the University of Oregon, Phil Knight, saw to it that those millions of new runners had swoosh-adorning footwear designed specifically for their sport.The pace of knowledge enhancement and innovation has, in fact, been so brisk through the years that even highly informed runners could be excused for not keeping up, but no longer. Running Science is a one-of-a-kind resource:- An easily comprehended repository of running research- A wealth of insights distilled from great sport and exercise scientists, coaches, and runners- A do-it-right reference for a host of techniques and tactics- An array of the most credible and widely used training principles and programs- Perhaps most of all, a celebration of the latest science-based know-how of running, now truly the world's most popular sportElite running coach Owen Anderson presents this comprehensive work in a compelling way for runners. A PhD and coach himself, Anderson has both a great enthusiasm for sharing what scientific studies offer the running community and a keen sense of what's really important for today's informed runners to know.
Disruptive Possibilities: How Big Data Changes Everything
Jeffrey Needham - 2013
As author Jeffrey Needham points out in this eye-opening book, big data can provide unprecedented insight into user habits, giving enterprises a huge market advantage. It will also inspire organizations to change the way they function."Disruptive Possibilities: How Big Data Changes Everything" takes you on a journey of discovery into the emerging world of big data, from its relatively simple technology to the ways it differs from cloud computing. But the big story of big data is the disruption of enterprise status quo, especially vendor-driven technology silos and budget-driven departmental silos. In the highly collaborative environment needed to make big data work, silos simply don't fit.Internet-scale computing offers incredible opportunity and a tremendous challenge--and it will soon become standard operating procedure in the enterprise. This book shows you what to expect.
How to Enjoy Reading Your Bible
Keith Ferrin - 2015
Here he shares the most helpful ideas and habits you can start using today. You will find ten proven tips that are equally practical whether you are a longtime Bible student or simply exploring what this life-changing book is all about.Aimed at deepening your relationship with God, these simple suggestions will help you focus more easily as you read, remember Scripture better, and most importantly, enjoy the Bible and its Author more than you ever dreamed possible.Includes Discussion Questions and Reading Suggestions for Small Groups "This book delivers on what the title promises."--Gary Thomas, bestselling author and speaker"Not only did Keith bring the Word to life for me, but he brought God to life for me again! I will be forever grateful."--Nancy Stephens, West Virginia
Waterlogged: The Serious Problem of Overhydration in Endurance Sports
Tim Noakes - 2012
The problem is that an overhydrated athlete is at a performance disadvantage and at risk of exercise-associated hyponatremia (EAH)--a potentially fatal condition.Dr. Tim Noakes takes you inside the science of athlete hydration for a fascinating look at the human body's need for water and how it uses the liquids it ingests. He also chronicles the shaky research that reported findings contrary to results in nearly all of Noakes' extensive and since-confirmed studies.In Waterlogged, Noakes sets the record straight, exposing the myths surrounding dehydration and presenting up-to-date hydration guidelines for endurance sport and prolonged training activities. Enough with oversold sports drinks and obsessing over water consumption before, during, and after every workout, he says. Time for the facts--and the prevention of any more needless fatalities.
The Toolbox Book: A Craftsman's Guide to Tool Chests, Cabinets, and Storage Systems (Craftsman's Guide to)
Jim Tolpin - 1995
"Ideas and inspiration galore".--"Wooden Boat Review". 190 color photos. 100 drawings.
Big Macs & Burgundy: Wine Pairings for the Real World
Vanessa Price - 2020
The science behind this unholy alliance is as elemental as acid, fat, salt, and minerals. Wine pro Vanessa Price explains how to create your own pairings while proving you don’t necessarily need fancy foods to unlock the joys of wine. Building upon the outsize success of her weekly column in Grub Street, Price offers delightfully bold wine and food pairings alongside hilarious tales from her own unlikely journey as a Kentucky girl making it in the Big Apple and in the wine business. Using language everyone can understand, she reveals why each dynamic duo is a match made in heaven, serving up memorable takeaways that will help you navigate any wine list or local bottle shop. Charmingly illustrated and bubbling with personality, Big Macs & Burgundy will open your mind to the entirely fun and entirely accessible wine pairings out there waiting to be discovered—and make you do a few spit-takes along the way.
PHP Pocket Reference
Rasmus Lerdorf - 2000
The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.
It's Not Carpal Tunnel Syndrome!: RSI Theory and Therapy for Computer Professionals
Suparna Damany - 2001
It explains the symptoms, prevention, and treatment of RSIs and also addresses the often-overlooked root causes of RSIs. This holistic program treats the entire upper body with ergonomics, exercise, and hands-on therapy, increasing the likelihood that surgery and drugs may be avoided.
bash Pocket Reference
Arnold Robbins - 2010
Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. You'll quickly find answers to annoying questions that always come up when you're writing shell scripts -- What characters do you need to quote? How do you get variable substitution to do exactly what you want? How do you use arrays? -- and much more.If you're a user or programmer of any Unix variant, or if you're using bash on Windows, you'll find this pocket reference indispensable. This book covers:Invoking the ShellSyntaxFunctionsVariablesArithmetic ExpressionsCommand HistoryProgrammable CompletionJob ControlShell OptionsCommand ExecutionCoprocessesRestricted ShellsBuilt-in Commands
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic