The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!


Lisa Morosky - 2012
    It also includes interviews with successful virtual assistants, interviews with clients who utilize a virtual assistant, resources at the end of most chapters, a 30-day reading guide and action plan, and access to The Bootstrap VA Facebook Group where readers can bounce ideas off of each other, ask Lisa questions, and get the support needed no matter where they are in the process of becoming and working as a virtual assistant.If you want to get started as a virtual assistant, and you're a go-getter looking to bootstrap your way to success, this is an eBook you can't afford to miss.ABOUT THE AUTHORLisa Morosky is the author of "The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!" and is a premier virtual assistant in the blogging, Internet marketing, social media, and online business realms. As the founder of VAforBloggers.com, Lisa worked with dozens of clients from 2009-2011, received mentions by and recommendations from top experts, spoke at the BlogWorld conference in Las Vegas, and built a business from the ground up. In 2011, Lisa made the decision to cut back, reposition her services and her client base, and spend more time on personal projects. She moved her services to her new, centralized home at The Home Life {and Me}, lowered her rates (to pass on her new savings to her clients), and changed her title to "blog helper". In 2012, Lisa launched her virtual assistant coaching services.In addition to being a virtual assistant and a virtual assistant coach, Lisa is a Christ follower, a proud wife to her amazing husband, a homemaker, a real foodie, and a lover of all things simple and natural. You can find her blogging about creating a simple, natural, faith-inspired home life at http://www.thehomelifeand.me.

MAKE: Electronics: Learning Through Discovery


Charles Platt - 2008
    I also love the sense of humor. It's very good at disarming the fear. And it's gorgeous. I'll be recommending this book highly." --Tom Igoe, author of Physical Computing and Making Things TalkWant to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the theory behind them!Build working devices, from simple to complex You'll start with the basics and then move on to more complicated projects. Go from switching circuits to integrated circuits, and from simple alarms to programmable microcontrollers. Step-by-step instructions and more than 500 full-color photographs and illustrations will help you use -- and understand -- electronics concepts and techniques.Discover by breaking things: experiment with components and learn from failureSet up a tricked-out project space: make a work area at home, equipped with the tools and parts you'll needLearn about key electronic components and their functions within a circuitCreate an intrusion alarm, holiday lights, wearable electronic jewelry, audio processors, a reflex tester, and a combination lockBuild an autonomous robot cart that can sense its environment and avoid obstaclesGet clear, easy-to-understand explanations of what you're doing and why

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

Sustainable Energy - Without the Hot Air


David J.C. MacKay - 2008
    In case study format, this informative reference answers questions surrounding nuclear energy, the potential of sustainable fossil fuels, and the possibilities of sharing renewable power with foreign countries. While underlining the difficulty of minimizing consumption, the tone remains positive as it debunks misinformation and clearly explains the calculations of expenditure per person to encourage people to make individual changes that will benefit the world at large.

A Most Dangerous Book: Tacitus's Germania from the Roman Empire to the Third Reich


Christopher B. Krebs - 2011
    When Tacitus wrote a not-very-flattering little book about the ancient Germans in 98 CE, at the height of the Roman Empire, he could not have foreseen that the Nazis would extol it as "a bible," nor that Heinrich Himmler, the engineer of the Holocaust, would vow to resurrect Germany on its grounds. But the Germania inspired—and polarized—readers long before the rise of the Third Reich. In this elegant and captivating history, Christopher B. Krebs, a professor of classics at Harvard University, traces the wide-ranging influence of the Germania over a five-hundred-year span, showing us how an ancient text rose to take its place among the most dangerous books in the world.

Making Things Move: DIY Mechanisms for Inventors, Hobbyists, and Artists


Dustyn Roberts - 2010
    Photographs, illustrations, screen shots, and images of 3D models are included for each project.This unique resource emphasizes using off-the-shelf components, readily available materials, and accessible fabrication techniques. Simple projects give you hands-on practice applying the skills covered in each chapter, and more complex projects at the end of the book incorporate topics from multiple chapters. Turn your imaginative ideas into reality with help from this practical, inventive guide.Discover how to:Find and select materialsFasten and join partsMeasure force, friction, and torqueUnderstand mechanical and electrical power, work, and energyCreate and control motionWork with bearings, couplers, gears, screws, and springsCombine simple machines for work and funProjects include:Rube Goldberg breakfast machineMousetrap powered carDIY motor with magnet wireMotor direction and speed controlDesigning and fabricating spur gearsAnimated creations in paperAn interactive rotating platformSmall vertical axis wind turbineSADbot: the seasonally affected drawing robotMake Great Stuff!TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists.

Accessory to War: The Unspoken Alliance Between Astrophysics and the Military


Neil deGrasse Tyson - 2018
    Spanning early celestial navigation to satellite-enabled warfare, Accessory to War is a richly researched and provocative examination of the intersection of science, technology, industry, and power that will introduce Tyson’s millions of fans to yet another dimension of how the universe has shaped our lives and our world.

Resurrection: The Kidnapping of Abby Drover


John Griffiths - 1999
    Instead, Abby survived four more months of rape, starvation and psychological torture before she was dramatically rescued. Here, John Griffiths tells the incredible story of Abby's ordeal, the nationwide search that went on for her while she lay captive less than a half a block from her own home, and her courageous recovery.. "Additionally, Griffiths explores the twisted mind of Abby's abductor, Donald Alexander Hay, a repeat sex offender Abby believed was a trusted friend. Covering Hay's recent bids for parole after more than twenty years in jail, the book raises important questions around prisoner rehabilitation, victim's rights and the very nature of justice.

Blue Jean Chef: Comfortable Under Pressure


Meredith Laurence - 2013
    By sharing tips, tricks and techniques with the QVC customers while equipping their kitchens with QVC’s professional Technique® and Blue Jean Chef® cookware, Meredith has helped people become comfortable in their kitchens. Now, in this cookbook, Meredith gives you a wide variety of delicious recipes for the pressure cooker, so you can get meals on the table in one third of the time it would normally take. Her recipes, tips, and techniques will help make any cook more Comfortable Under Pressure. With 125 recipes and over 100 tips and explanations, Blue Jean Chef: Comfortable Under Pressure will help you create delicious meals while becoming more versatile and at ease with your pressure cooker. Don’t let the pressure get to you! Get Comfortable Under Pressure!

From Here to Infinity: A Vision for the Future of Science


Martin J. Rees - 2011
    To shape debates over health care, energy policy, space travel, and other vital issues, ordinary citizens must engage directly with research rather than relying on pundits’ and politicians’ interpretations. Otherwise, fringe opinions that have been discredited in the scientific community can take hold in the public imagination. At the same time, scientists must understand their roles as communicators and ambassadors as well as researchers.Rees not only diagnoses this central problem but also explains how scientists and the general public can deploy a global, long-term perspective to address the new challenges we face. In the process, he reveals critical shortcomings in our current system—for example, the tendency to be overly anxious about minor hazards while underrating the risk of potential catastrophes. Offering a strikingly clear portrait of the future of science, Rees tackles such diverse topics as the human brain, the possibility that humans will colonize other planets, and the existence of extraterrestrial life in order to distinguish between what scientists can hope to discover and what will always lie beyond our grasp.A fresh perspective on science’s significance and potential, From Here to Infinity will inspire and enlighten.

Resource Revolution: How to Capture the Biggest Business Opportunity in a Century


Stefan Heck - 2014
    The rapid urbanization of a new 2.5-billion-person middle class in Asia will create an unprecedented demand for oil, steel, land, food, water, cement, and other commodities over the next two decades. Heck and Rogers explore the ways in which innovators, including startups and global leaders from Cree to GE, have answered the challenge with practical steps to guide managers everywhere.

Designing Sound


Andy Farnell - 2010
    Its thesis is that any sound can be generated from first principles, guided by analysis and synthesis. The text takes a practitioner's perspective, exploring the basic principles of making ordinary, everyday sounds using an easily accessed free software. Readers use the Pure Data (Pd) language to construct sound objects, which are more flexible and useful than recordings. Sound is considered as a process, rather than as data--an approach sometimes known as "procedural audio." Procedural sound is a living sound effect that can run as computer code and be changed in real time according to unpredictable events. Applications include video games, film, animation, and media in which sound is part of an interactive process. The book takes a practical, systematic approach to the subject, teaching by example and providing background information that offers a firm theoretical context for its pragmatic stance. [Many of the examples follow a pattern, beginning with a discussion of the nature and physics of a sound, proceeding through the development of models and the implementation of examples, to the final step of producing a Pure Data program for the desired sound. Different synthesis methods are discussed, analyzed, and refined throughout.] After mastering the techniques presented in Designing Sound, students will be able to build their own sound objects for use in interactive applications and other projects

The Eudaemonic Pie


Thomas A. Bass - 1985
    “The result is a veritable pi

The Chinese Invasion Threat: Taiwan's Defense and American Strategy in Asia


Ian Easton - 2017
    From a historic spy case that saved Taiwan from communist takeover to modern day covert action programs, and from emergency alert procedures to underground coastal defense networks, this is the untold story of the most dangerous flashpoint of our times.""Easton offers a brilliant, thick description of China's invasion plans, Taiwan's plans to repel an invasion, potential invasion scenarios, and how the U.S. might respond. Throughout the incredible level of detail, and the vast number of plans, locations, weapons systems, operations and doctrines it presents, Easton's clarity of order and logical presentation keep everything firmly under control.Where would it arrive? When would it come? How would China attack Taiwan?Easton paints the way the island-nation would be attacked with a fine calligraphy brush, detailing how the landings would go, what would happen if the PRC got a foothold, and what weapons would be deployed where and how."Democratic-ruled Taiwan poses an existential threat to China's communist leaders because the island, located some 90 miles off the southeast coast "serves as a beacon of freedom for ethnically Chinese people everywhere," the book states."What Easton has done is provide a vital warning to America and its allies, China could try to invade Taiwan as early as the first half of the next decade."Easton is a Washington-based think tank Project 2049 Institute research fellow and a former National Chengchi University student.

The science of secrecy: The secret history of codes and codebreaking


Simon Singh - 1999
    This book, which accompanies the major Channel 4 series, brings to life the hidden history of codes and code breaking. Since the birth of writing, there has also been the need for secrecy. The story of codes is the story of the brilliant men and women who used mathematics, linguistics, machines, computers, gut instinct, logic and detective work to encrypt and break these secrect messages and the effect their work has had on history. In each episode of "The Science of Secrecy" Simon Singh tells us a fascinating story from the history of codes: how the course of Crimean War was changed by the cracking of "unbreakable" Vigenere code; how the well-timed cracking of a single encoded telegram altered the course of World War I or how the mysteries of the Rosetta stone were revealed. The programme, and book, also investigates present day concerns about privacy on the internet and public key cryptography and looks to the future and the possibilities that quantum computing will radically change the science of secrecy in the 21st century.