Book picks similar to
Computers by Larry E. Long


textbook
business
computers
for-school

Code Complete


Steve McConnell - 1993
    Now this classic book has been fully updated and revised with leading-edge practices--and hundreds of new code samples--illustrating the art and science of software construction. Capturing the body of knowledge available from research, academia, and everyday commercial practice, McConnell synthesizes the most effective techniques and must-know principles into clear, pragmatic guidance. No matter what your experience level, development environment, or project size, this book will inform and stimulate your thinking--and help you build the highest quality code. Discover the timeless techniques and strategies that help you: Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor--or evolve--code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project

Head First Design Patterns


Eric Freeman - 2004
     At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.

Pro JPA 2: Mastering the Java Persistence API


Mike Keith - 2009
    JPA provides Java developers with both the knowledge and insight needed to write Java applications that access relational databases through JPA.Authors Mike Keith and Merrick Schincariol take a hands-on approach to teaching by giving examples to illustrate each concept of the API and showing how it is used in practice.All of the examples use a common model from an overriding sample application, giving readers a context from which to start and helping them to understand the examples within an already familiar domain.After completing the book, you will have a full understanding and be able to successfully code applications using JPA. The book also serves as a reference guide during initial and later JPA application experiences.Hands-on examples for all the aspects of the JPA specification, based on the reference implementation of this specification A special section on migration to JPA Expert insight about various aspects of the API and when they are useful Portability hints to provide increased awareness of the potential for non-portable JPA code

The Real Estate Wholesaling Bible: The Fastest, Easiest Way to Get Started in Real Estate Investing


Than Merrill - 2014
    Think of it as the day trading of real estate except it is simpler and has less risk if you learn how the process works. In fact when you learn how to do it the right way, you can minimize your risk substantially. The Real Estate Wholesaling Bible teaches what you need to know to profit from real estate wholesaling without needing a lot of capital or previous experience. This rapidly expanding business is relatively simple, profitable, and perfect for today's real estate market. Plus it's an ideal system for making money even in the toughest real estate markets. All you will need to get started is a computer, an Internet connection, this audiobook, some passion, and a lot of curiosity.- Teaches the mechanics of how to wholesale real estate, including exactly how to find, analyze, finance, and sell wholesale deals like clockwork - Explains how actually to build a business and develop systems that are not dependent on you as the business owner - Shows how to develop a turnkey, systems-dependent business that serves as a vehicle for all the people it touches: the owners, the employees, and the community Many real estate investors' ideas of success focus squarely on profitability. Author Than Merrill believes success happens when your real estate investment business is not only profitable but also gives you the time to enjoy your life and fulfill your passions and dreams.

ACA Ethical Standards Casebook


Barbara Herlihy - 1989
    The 6th edition reflects the latest changes in the 2005 ACA Code of Ethics and how to apply these standards in work with diverse clients.

Rules for Modern Life: A Connoisseur's Survival Guide


David Tang - 2016
    Around every corner lies a potential faux pas waiting to happen. But if you've ever struggled for the right response to an unwelcome gift or floundered for conversation at the dinner party from hell, fear not: help is at hand.In Rules for Modern Life, Sir David Tang, resident agony uncle at the Financial Times, delivers a satirical masterclass in navigating the social niceties of modern life. Whether you're unsure of the etiquette of doggy bags or wondering whether a massage room in your second home would be de trop, Sir David has the answer to all your social anxieties - and much more besides.

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

System Software: An Introduction to Systems Programming


Leland L. Beck - 1985
    Stressing the relationship between system software and the architecture of the machine it is designed to support, Beck first presents the fundamental concepts and basic design of each type of software in a machine-independent way. He then discusses both machine-dependent and independent extensions to the basic concepts, and gives examples of the actual system software. New FeaturesProvides updated architecture and software examples, including the Intel x86 family (Pentium, P6, etc.), IBM PowerPC, Sun SPARC, and Cray T3E. Includes an introduction to object-oriented programming and design, and illustrates these concepts of object-oriented languages, compilers, and operating systems. Brings the book up-to-speed with industry by including current operating systems topics, such as multiprocessor, distributed, and client/server systems. Contains a wide selection of examples and exercises, providing teaching support as well as flexibility, allowing you to concentrate on the software and architectures that you want to cover.

My Job Went to India


Chad Fowler - 2005
    You may still be drawing a paycheck, but the job you were hired to do no longer exists. Your company has changed, the technology has changed, the economy has changed, and the ways you can add value have changed. Have you adapted to these changes? Or are you at risk? Architect your career Economic downturn. Job cuts. Outsourcing. The ever-changing tech landscape. The threats abound. Chad Fowler is here to offer 52 ways to keep your job, despite the vagaries of the market.It's all about making the right choices. Choosing which technologies to focus on and which business domains to master have at least as much impact on your success as your technical knowledge--don't let those choices be accidental. Chad shows you all aspects of the decision-making process so you can ensure that you're investing your time and energy in the right areas.It's all about skills. You'll develop a structured plan for keeping your skills up-to-date so that you can compete with both the growing stable of developers in so-called low-cost countries as well as your higher-priced local peers. You'll learn how to shift your skillset up the value chain, from an offshore-ready commodity to one in high demand.It's all about marketing. As with any product or service, if nobody knows what you're selling, nobody will buy. Chad shows you how to create a plan for marketing yourself both inside your company and to the industry in general.Like it or not, the IT career landscape has changed. This handbook will teach you what you need to do to avoid being left behind. About the author Chad Fowler has been a software developer and manager for some of the world's largest corporations. He recently lived and worked in India, setting up and leading an offshore software development center for a large multinational company.

Essentials of the U.S. Health Care System


Leiyu Shi - 2004
    Health System, This Condensed Distillation Of The Important Topics Covered In Delivering Health Care In America Is The Perfect Resource For Courses In Health Policy, Allied Health, Health Administration And More. It Clarifies The Complexities Of Health Care Organization And Finance And Presents A Solid Overview Of How The Various Components Fit Together. The Second Edition Of Essentials Of The US Health Care System Has Been Updated To Include New Data, Charts, Tables And Accompanying Information Throughout The Book. Use As A Stand-Alone Text, Or A Supplement In Various Courses. New Content Includes: Medicare, Medicaid And SCHIP. Ongoing Evolution In U.S. Health Care As A Result Of Corporatization And Globalization. The Role Of Hospitalists. Updated Content On Parts C And D Of Medicare. Including Information On High-Deductible Health Plans/Health Savings Accounts As An Insurance Option. Updated Content On Primary Care And Community Oriented Health Care Development Current Development On Hospital Extensions To The Community. Current Development On Nano Technology. Current Health Policy Issues. Current Discussion On Healthcare Reforms, Including Future Challenges Posed By The Increased Need For Long-Term Care. New Third Edition Now Available!

Nmap Cookbook: The Fat-free Guide to Network Scanning


Nicholas Marsh - 2010
    Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.

Java for Dummies [With CDROM]


Barry Burd - 2006
    This book makes it easy From how to install and run Java to understanding classes and objects and juggling values with arrays and collections, you will get up to speed on the new features of Java 6 in no time.Discover how toUse object-oriented programmingWork with the changes in Java 6 and JDK 6Save time by reusing codeMix Java and Javascript with the new scripting toolsTroubleshoot code problems and fix bugsAll on the bonus CD-ROMCustom build of JCreator and all the code files used in the bookBonus chapters not included in the bookTrial version of Jindent, WinOne, and NetCaptor freewareSystem Requirements: For details and complete system requirements, see the CD-ROM appendix.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Writing Secure Code


Michael Howard - 2001
    You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

OpenIntro Statistics


David M. Diez - 2012
    Our inaugural effort is OpenIntro Statistics. Probability is optional, inference is key, and we feature real data whenever possible. Files for the entire book are freely available at openintro.org, and anybody can purchase a paperback copy from amazon.com for under $10.The future for OpenIntro depends on the involvement and enthusiasm of our community. Visit our website, openintro.org. We provide free course management tools, including an online question bank, utilities for creating course quizzes, and many other helpful resources.CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED ‘AS IS’ AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.Can’t find it here? Search Amazon.com Search: All Products Apparel & AccessoriesBabyBeautyBooksCamera & PhotoCell Phones & ServiceClassical MusicComputersComputer & Video GamesDVDElectronicsGourmet FoodHome & GardenMiscellaneousHealth & Personal CareJewelry & WatchesKitchen & HousewaresMagazine SubscriptionsMusicMusical InstrumentsSoftwareSports & OutdoorsTools & HardwareToys & GamesVHS Keywords:

Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web


Paul Adams - 2011
    It is moving away from its current structure of documents and pages linked together, and towards a new structure that is built around people. This is a profound change that will affect how we create business strategy, design, marketing, and advertising. The reason for this shift is simple. For tens of thousands of years we've been social animals. The web, which is only 20 years old, is simply catching up with offline life.From travel to news to commerce, smart businesses are reorienting their efforts around people-around the social behavior of their customers and potential customers. In order to be successful, businesses will need to understand how people are connected, how their social network influences them, how the people closest to them influence them the most, and how it's more important for marketers to focus on small, connected groups of friends rather than looking for overly influential individuals.This book pulls together the latest research from leading universities and technology companies to describe how people are connected, and how ideas and brand messages spread through social networks. It shows readers how to rebuild their business around social behavior, and create products that people tell their friends about.