Riley Paige Mystery Bundle: Once Gone / Once Taken


Blake Pierce - 2016
    A serial killer is out there, his frequency increasing, and they know there is only one agent good enough to crack this case: Special Agent Riley Paige. Riley is on paid leave herself, recovering from her encounter with her last serial killer, and, fragile as she is, the FBI is reluctant to tap her brilliant mind. Yet Riley, needing to battle her own demons, comes on board, and her hunt leads her through the disturbing subculture of doll collectors, into the homes of broken families, and into the darkest canals of the killer’s mind. As Riley peels back the layers, she realizes she is up against a killer more twisted than she could have imagined.In ONCE TAKEN, women are being murdered in upstate New York, their bodies found mysteriously hanging in chains. With the FBI called in, given the bizarre nature of the murders—and the lack of any clues—there is only one agent they can turn to: Special Agent Riley Paige. Riley, reeling from her last case, is reluctant to take on a new one, since she is still convinced a former serial killer is out there, stalking her. She knows, though, that her ability to enter a serial killer’s mind and her obsessive nature is what will be needed to crack this case, and she just can’t refuse—even if it will push her over the edge.Dark psychological thrillers with heart-pounding suspense, the Riley Paige mysteries are a riveting new series—with a beloved new character—that will leave you turning pages late into the night.

Ultimate Hard Bastards: The Truth About the Toughest Men in the World


Kate Kray - 2005
    In this awesome follow-up to the hugely successful Hard Bastards and Hard Bastards 2, Kate Kray, who was married to Ronnie Kray, gets the answers to questions nobody else would dare to ask. We learn the truth about what drives some of these characters to live on the edge of the law, whether it be a matter of gaining respect or striving for survival.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Learning React: A Hands-On Guide to Building Maintainable, High-Performing Web Application User Interfaces Using the React JavaScript Library


Kirupa Chinnathambi - 2016
    

The Imposter's Handbook


Rob Conery - 2016
    New languages, new frameworks, new ways of doing things - a constant struggle just to stay current in the industry. This left no time to learn the foundational concepts and skills that come with a degree in Computer Science.

Microsoft .NET - Architecting Applications for the Enterprise


Dino Esposito - 2014
    But the principles and practices of software architecting–what the authors call the “science of hard decisions”–have been evolving for cloud, mobile, and other shifts. Now fully revised and updated, this book shares the knowledge and real-world perspectives that enable you to design for success–and deliver more successful solutions. In this fully updated Second Edition, you will: Learn how only a deep understanding of domain can lead to appropriate architecture Examine domain-driven design in both theory and implementation Shift your approach to code first, model later–including multilayer architecture Capture the benefits of prioritizing software maintainability See how readability, testability, and extensibility lead to code quality Take a user experience (UX) first approach, rather than designing for data Review patterns for organizing business logic Use event sourcing and CQRS together to model complex business domains more effectively Delve inside the persistence layer, including patterns and implementation.

IBM PC Assembly Language and Programming


Peter Abel - 1987
    Coverage starts from scratch, discussing the simpler aspects of the hardware, and the language, then introduces technical details and instructions as they are needed.

Real World Java EE Patterns--Rethinking Best Practices


Adam Bien - 2009
    :-)

The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset


Joy Mundy - 2006
    In this new edition, the authors explain how SQL Server 2008 R2 provides a collection of powerful new tools that extend the power of its BI toolset to Excel and SharePoint users and they show how to use SQL Server to build a successful data warehouse that supports the business intelligence requirements that are common to most organizations. Covering the complete suite of data warehousing and BI tools that are part of SQL Server 2008 R2, as well as Microsoft Office, the authors walk you through a full project lifecycle, including design, development, deployment and maintenance.Features more than 50 percent new and revised material that covers the rich new feature set of the SQL Server 2008 R2 release, as well as the Office 2010 release Includes brand new content that focuses on PowerPivot for Excel and SharePoint, Master Data Services, and discusses updated capabilities of SQL Server Analysis, Integration, and Reporting Services Shares detailed case examples that clearly illustrate how to best apply the techniques described in the book The accompanying Web site contains all code samples as well as the sample database used throughout the case studies The Microsoft Data Warehouse Toolkit, Second Edition provides you with the knowledge of how and when to use BI tools such as Analysis Services and Integration Services to accomplish your most essential data warehousing tasks.

Data Structures and Algorithm Analysis in C


Mark Allen Weiss - 1992
    The book's conceptual presentation focuses on ADTs and the analysis of algorithms for efficiency, with a particular concentration on performance and running time. The second edition contains a new chapter that examines advanced data structures such as red black trees, top down splay trees, treaps, k-d trees, and pairing heaps among others. All code examples now conform to ANSI C and coverage of the formal proofs underpinning several key data structures has been strengthened.

The 8088 and 8086 Microprocessors: Programming, Interfacing, Software, Hardware, and Applications


Walter A. Triebel - 1991
    This volume offers thorough, balanced, and practical coverage of both software and hardware topics. Develops basic concepts using the 8088 and 8086 microprocessors, but the 32-bit version of the 80x86 family is also discussed. Examines how to assemble, run, and debug programs, and how to build, test, and troubleshoot interface circuits. Provides detailed coverage of floating-point processing and the single instruction multiple data (DIMD) processing capability of the advanced Pentium processor. Includes added material on number systems, logic functions and operations, conversion between number systems, and addition/subtraction of binary numbers. Includes new advanced material such as floating Point Architecture and Instructions, Multimedia (MMX) Architecture and Instructions, and the hardware and hardware architecture of the Pentium 3 and Pentium 4 processors. Covers the Intel architecture microprocessor families: 8088, 8086, 80286, 80386, 80486, and the latest Pentium(R) processors. Illustrates commands of the DEBUG program and how to assemble, disassemble, load, save, execute, and debug programs on the IBM PC. Introduces the contents of the 8088's instruction set. Explores practical implementation techniques, covering the use of latches, transceivers, buffers, and programmable logic devices in the memory and I/O interfaces of the microcomputer system. A valuable handbook for self-study in learning microprocessors, for electrical engineers, electronic technicians, and all computer programmers.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Learning SPARQL


Bob DuCharme - 2011
    With this concise book, you will learn how to use the latest version of this W3C standard to retrieve and manipulate the increasing amount of public and private data available via SPARQL endpoints. Several open source and commercial tools already support SPARQL, and this introduction gets you started right away.Begin with how to write and run simple SPARQL 1.1 queries, then dive into the language's powerful features and capabilities for manipulating the data you retrieve. Learn what you need to know to add to, update, and delete data in RDF datasets, and give web applications access to this data.Understand SPARQL’s connection with RDF, the semantic web, and related specificationsQuery and combine data from local and remote sourcesCopy, convert, and create new RDF dataLearn how datatype metadata, standardized functions, and extension functions contribute to your queriesIncorporate SPARQL queries into web-based applications

Thinking in CSS


Aravind Shenoy - 2014
    Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.

CompTIA A+ Certification All-in-One Exam Guide (A+ Certification All in One Exam)


Mike Meyers - 2006
    Mike Meyers, the leading authority on CompTIA A+ certification and training, has helped hundreds of thousands of people pass the CompTIA A+ exams-and now he can help you too. Inside, you'll find detailed coverage of the exam format, helpful exam tips, end-of-chapter practice questions, and hundreds of photographs and illustrations. After you ace the exams, this comprehensive guide will serve as an essential on-the-job reference.Full details on all exam objectives, including how to: Work with CPUs, RAM, and motherboards Install, partition, and format hard drives Work with portable PCs, PDAs, and wireless technologies Install, upgrade, and troubleshoot Windows 2000 Professional and Windows XP Install sound and video cards Manage printers and connect to networks Implement security measures Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Eight full practice exams covering CompTIA A+ Essentials and Exams 220-602, 220-603, & 220-604 One hour of LearnKey video training featuring Mike Meyers teaching key A+ topics Electronic copy of the book Complete exam objective map for all four exams List of official CompTIA A+ acronyms Useful tools and utilities for PC technicians