Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Data Structures Using C and C++


Yedidyah Langsam - 1995
     Covers the C++ language, featuring a wealth of tested and debugged working programs in C and C++. Explains and analyzes algorithms -- showing step- by-step solutions to real problems. Presents algorithms as intermediaries between English language descriptions and C programs. Covers classes in C++, including function members, inheritance and object orientation, an example of implementing abstract data types in C++, as well as polymorphism.

Programming Windows 8 Apps with HTML, CSS, and JavaScript


Kraig Brockschmidt - 2012
    

An Introduction to Data Structures with Applications


Jean-Paul Tremblay - 1984
    Product Condition: No Defects.

Computer Science: A Structured Approach Using C++


Behrouz A. Forouzan - 1999
    Every complete program uses a consistent style, and as programs are analyzed, styles and standards are further explained. Whenever possible, the authors develop the principle of a subject before they introduce the language implementation so the student understands the concept before dealing with the nuances of C++. In addition, a vast array of figures and tables visually reinforce key concepts. By integrating software engineering principles and encouraging the student to resist the temptation to immediately code, the text builds a solid foundation in problem solving.

Exam Ref 70-480: Programming in HTML5 with JavaScript and CSS3


Rick Delorme - 2013
    Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Implement and manipulate document structures and objectsImplement program flowAccess and secure dataUse CSS3 in applicationsThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)

Programming Scala


Venkat Subramaniam - 2009
    You can use it to write traditional, imperative, object-oriented code. But you can also leverage its higher level of abstraction to take full advantage of modern, multicore systems. Programming Scala will show you how to use this powerful functional programming language to create highly scalable, highly concurrent applications on the Java Platform. The increasing popularity and availability of multicore processors is creating a whole new set of challenges--although you can enjoy true concurrency, you're now faced with higher contention and synchronization issues. Deploying an existing application on a multicore processor may bring out previously hidden concurrency issues. Java's multi-threading facility by itself isn't enough---it's a very low level abstraction. Instead, you need a paradigm that provides a higher level of abstraction to deal with concurrency. It's time to embrace Functional Programming. Scala is a hybrid Object-Oriented/Functional Programming language on the JVM. Using Scala, you can create traditional imperative programs, intermix them with Java code, and at the same time take advantage of higher levels of abstraction. You can use features that lead to concise, highly expressive code that remove the pain of dealing with concurrency.Programming Scala will show you the fundamentals of functional programming using Scala. Very quickly, you'll learn how this statically typed language can give you dynamic capabilities to create concise, scalable, highly capable concurrent code. Pragmatic programmers always use the right tool for the job. For concurrent programming on the Java VM, Scala is the tool, and Programming Scala by award-winning author Venkat Subramaniam is your guide.

Stone One Tough Texan


Janalyn Knight - 2020
    Praying for anything to save the Iron Horse Ranch, he’s shocked by the miracle offer from Wy Talbot.A talented female landman, Wy has made an impressive career in the oil and gas industry and has worked with many handsome cowboys though she’ll be damned if she ever falls for one. But Stone’s sweet drawl and southern manners begin to break apart the walls she’s built around her heart.Unexpected desires are another… Stone has been so focused on the ranch and being a single father, he hasn’t given himself the chance to find love. As he works with Wy, passions grow and feelings deepen. But Wy never planned any life other than doggedly pursuing her career, and Stone can’t imagine her being anywhere but with him. When disaster strikes, will they witness the true miracle of love?

The Dreaming Reality


Noor Anand - 2018
    I am Ridhima Maniktala, 21.I'm in a relationship with Rihansh Kashyap.He is my student, and 5 years younger to me.I read about a disease called Cullen Syndromein which the patient gets vivid dreams about their future.I also get lifelike dreams about a woman called Sara and her family of three.But I haven't told Rihansh about my last dream in which Sara receives a phone call saying "Your husband was killed in a car crash."Am I Sara?Is Rihansh going to die?Will my dreams be my future?

The Mage Slayer


Whiskey Flowers - 2018
    A war breaks out and the peaceful Gaea are no match for the brutality of the Holyan soldiers or the sheer destruction of the Holyan mages. Having no defense against the Holyan magic, the desperate Gaea hatch a plan to create a weapon capable of stopping the Gaea advance, before the weapon can be put to use, the Gaea are routed and their people were taken as slaves. Rae’al’nor was that weapon but was too young to be of any use and was taken as one of the slaves. As Rae’al’nor grows up, he is adopted by a Holyan noble and given the name Ray Riverdale. Ray was content in his life until the evil of mages is so strong he cannot ignore it any more. Join Ray as he remembers his purpose in life and transforms from prey to the Mage Slayer.

Recruited


R.R. Haywood - 2014
    A chance to set things right. Mike Humber, an ex-detective sacked for beating a child molester is offered an opportunity to make amends for the failures of his past but once that path is chosen it leads to an event that changes everything he has ever known.From the mind of the best-selling author RR Haywood comes a violent gut-wrenching tale of revenge.RECRUITED was first published in RR Haywood's The Book of Shorts Volume One to great critical acclaim

Beautiful Love


P.G. Van - 2018
    She downs some extra shots at the bachelorette party and before she knows it, ends up with a handsome stranger on a balcony. She doesn’t remember what happened except for his dark eyes and sweet words. Who is the stranger, and why does she remember only him and nothing else? Note: This is a standalone short and hot romance with approximately 16,000 words. WARNING: This is a fictional romance story with insta-love and a super sweet ending. Please proceed with caution as the book contains content that is recommended for mature reading audiences.

Get IELTS Band 9 - In General Training Writing Task 1 Letters


Cambridge IELTS Consultants - 2015
    This book shows you a 3-step process to plan and write your letter, for any type of Task situation that you may meet. This book has twelve example Tasks; each one has a full commentary about the instructions, a Band 9 model letter, and an explanation of why the letter achieves such a high score. We show you how to begin, organise and end the letter, how to move your grammar and vocabulary between formal and personal styles, and how to create content that will impress the IELTS examiners, even if your English is not perfect. For anyone taking the IELTS General Training Test, the exam is an important step in your life. This book will help you to take that step with confidence, and get the best possible result on the day. About the authors: Cambridge IELTS Consultants are a team of IELTS trainers and past examiners based in Cambridge, United Kingdom. They have many years experience of preparing students for IELTS Academic and General Training, marking the essays and developing course books to guide candidates through the Cambridge IELTS process. They really are the experts!

Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack


Alan T. Norman - 2016
    Get this Amazing #1 Amazon Top Release - Great Deal! You can read on your PC, Mac, smartphone, tablet or Kindle device. This book will teach you how you can protect yourself from most common hacking attacks -- by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack. Within this book are techniques and tools that are used by both criminal and ethical hackers – all the things that you will find here will show you how information security can be compromised and how you can identify an attack in a system that you are trying to protect. At the same time, you will also learn how you can minimise any damage in your system or stop an ongoing attack. Read this book for FREE on Kindle Unlimited - Download NOW! With Hacking: Computer Hacking Beginners Guide…, you'll learn everything you need to know to enter the secretive world of computer hacking. It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Spoofing Techniques WiFi Hacking Hacking Tools Your First Hack Passive Attacks Download Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack right away - This Amazing New Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, WiFi hacking, and tips for ethical hacking. You'll even learn how to make your first hack. Today For Only $3.99 $5.99 $0.99. Scroll Up And Start Enjoying This Amazing Deal Instantly

IBM PC Assembly Language and Programming


Peter Abel - 1987
    Coverage starts from scratch, discussing the simpler aspects of the hardware, and the language, then introduces technical details and instructions as they are needed.