Web Development with Clojure: Build Bulletproof Web Apps with Less Code


Dmitri Sotnikov - 2013
    Web Development With Clojure shows you how to apply Clojure programming fundamentals to build real-world solutions. You'll develop all the pieces of a full web application in this powerful language. If you already have some familiarity with Clojure, you'll learn how to put it to serious practical use. If you're new to the language, the book provides just enough Clojure to get down to business.You'll learn the full process of web development using Clojure while getting hands-on experience with current tools, libraries, and best practices in the language. You'll develop Clojure apps with both the Light Table and Eclipse development environments. Rather than frameworks, Clojure development builds on rich libraries. You'll acquire expertise in the popular Ring/Compojure stack, and you'll learn to use the Liberator library to quickly develop RESTful services. Plus, you'll find out how to use ClojureScript to work in one language on the client and server sides.Throughout the book, you'll develop key components of web applications, including multiple approaches to database access. You'll create a simple guestbook app and an app to serve resources to users. By the end, you will have developed a rich Picture Gallery web application from conception to packaging and deployment.This book is for anyone interested in taking the next step in web development.Q&A with Dmitri SotnikovWhy did you write Web Development with Clojure?When I started using Clojure, I found that it took a lot of work to find all the pieces needed to put together a working application. There was very little documentation available on how to organize the code, what libraries to use, or how to package the application for deployment. Having gone through the process of figuring out what works, I thought that it would be nice to make it easier for others to get started.What are the advantages of using a functional language?Over the course of my career, I have developed a great appreciation for functional programming. I find that it addresses a number of shortcomings present in the imperative paradigm. For example, in a functional language any changes to the data are created via revisions to the existing data. So they only exist in the local scope. This fact allows us to safely reason about individual parts of the program in isolation, which is critical for writing and supporting large applications.Why use Clojure specifically?Clojure is a simple and pragmatic language that is designed for real-world usage. It combines the productivity of a high-level language with the excellent performance seen in languages like C# or Java. It's also very easy to learn because it allows you to use a small number of concepts to solve a large variety of problems.If I already have a preferred web development platform, what might I get out of this book?If you're using an imperative language, you'll get to see a very different approach to writing code. Even if you're not going to use Clojure as your primary language, the concepts you'll learn will provide you with new ways to approach problems.Is the material in the book accessible to somebody who is not familiar with Clojure?Absolutely. The book targets developers who are already familiar with the basics of web development and are interested in learning Clojure in this context. The book introduces just enough of the language to get you productive and allows you to learn by example.

The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online


Violet Blue - 2014
    For every trustworthy website, there are countless jerks, bullies, and scam artists who would harvest your personal information for their own purposes. But you can fight back, right now.In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will show you how to:•Delete personal content from websites•Use website and browser privacy controls effectively•Recover from and prevent identity theft•Figure out where the law protects you—and where it doesn’t•Set up safe online profiles•Remove yourself from people finder websitesEven if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life.

Kursk Down: The Shocking True Story of the Sinking of a Russian Nuclear Submarine


Clyde W. Burleson - 2002
    Hailed as "unsinkable, " the "Kursk" was on maneuvers when mysterious explosions rocked the sub, causing it to sink to the bottom of the sea with its 118-man crew. This in-depth look at the disaster reveals previously unreleased information from family members of the deceased as well as from government officials.

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

DevOps Troubleshooting: Linux Server Best Practices


Kyle Rankin - 2012
    It has saved me hours in troubleshooting complicated operations problems." -Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In DevOps Troubleshooting: Linux Server Best Practices , award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You'll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps' approach to troubleshooting and proven Linux server problem-solving principles Diagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecks Understand healthy boots, so you can identify failure points and fix them Solve full or corrupt disk issues that prevent disk writes Track down the sources of network problems Troubleshoot DNS, email, and other network services Isolate and diagnose Apache and Nginx Web server failures and slowdowns Solve problems with MySQL and Postgres database servers and queries Identify hardware failures-even notoriously elusive intermittent failures

Everyday Barbecue: At Home with America's Favorite Pitmaster


Myron Mixon - 2013
    Don’t mess it up.”  As the winningest man in barbecue, a New York Times bestselling cookbook author, and a judge on the hit show BBQ Pitmasters on Discovery’s Destination America, Myron Mixon knows more about smoking meat than any man alive. And now he’s on a mission to prove to home cooks everywhere that they can make great barbecue any day of the week—in the comfort of their own backyard or kitchen, no matter their skill level. Across the country at competitions and in his Pride & Joy Bar-B-Que restaurants, Mixon has proven that no other pitmaster’s food can touch his when he’s behind a smoker. But he doesn’t need fancy equipment to do it: He can cook delicious barbecue with any grill, smoker, or oven, even on the busiest weeknight, and you’ll be able to, too, with the nearly 150 recipes in Everyday Barbecue. Armed with Mixon’s advice and tips, you’ll discover that barbecue isn’t just for the Fourth of July and Labor Day; it’s for any day you feel like cooking it. So fire up your grill and get ready to cook incredible barbecue favorites such as Ribs the Easy Way, Myron’s Dr Pepper Can Chicken, and The King Rib sandwich and adventurous backyard fare like Pork Belly Sliders and Barbecue-Fried Baby Backs, plus leftover inspirations, delectable deserts, and even some drunken recipes!In Everyday Barbecue, you will find some seriously finger-lickin’ good barbecue recipes, including:  • The Essentials: Turning any backyard grill into a smoker—Brisket the Easy Way, Ribs the Easy Way, The Only Barbecue Sauce You Need• Burgers and Sandwiches: Classic Hickory Smoked Barbecue Burger, The King Rib, Barbecue Pork Belly Sliders, Brisket Cheesesteaks, Barbecued Veggie Sandwiches• Smoked and Grilled: Perfect Grilled Rib Eyes, Whole Roasted Turkey with Bourbon Gravy, Myron’s Dr Pepper Can Chicken• Barbecue-Fried: Yes, first you smoke it, then you fry it—Baby Backs, Chicken Lollipops, Cap’n Crunch Chicken Tenders• Swimmers: Finger-Lickin’ Barbecue Shrimp-and-Cheese Grits, Smoky Catfish Tacos• Drunken Recipes: Bourbon Brown Sugar Chicken, Whiskey Grilled Shrimp• Barbecue Brunch: Pitmaster’s Smoked Eggs Benedict with Pulled Pork Cakes, Backyard Bacon• Plus, Salads and Sides, delectable Desserts, and Leftover inspirations! Baby Back Mac and Cheese, Tinga-Style Barbecue Tacos, Chocolate Cake on the Grill, and Grilled Skillet Apple Pie   Loaded with nearly 150 recipes and mouthwatering photographs throughout, Everyday Barbecue serves up barbecue’s greatest hits (and more) in a fast, efficient way that you’ve never seen before.Praise for Everyday Barbecue   “Mixon does an admirable job of showing grillers, smokers, and barbecuers how they can turn labor and time-intensive grilling and barbecue projects into weekday meals with a minimum of fuss in this to-the-point collection of 150 smoke-centered recipes. . . . It’s his ingenious use of leftovers that will make readers take notice as he offers suggestions for mountains of leftover brisket, pulled pork, or chicken. This approach—rather than a multitude of variations on ribs, pulled pork and a bevy of sauces—sets the book apart and make it a keeper.”—Publishers Weekly

Kindle Fire HD User Manual: The Complete User Guide With Instructions, Tutorial to Unlock The True Potential of Your Device in 30 Minutes (OCT 2015)


Jake Jacobs - 2013
    You'll also learn tips and tricks to help you unlock the true potential of your device. Here are just some of the essentials you'll learn from this book: - Master the settings of your Kindle Fire HD device - Drastically reduce charge time & boost battery life - Setting up and using wireless networks - Utilizing security features to safeguard your device - Increase productivity: Skype, Email, Cloud Storage, Reading Documents, File Explorer - Sync your Kindle Fire HD to your computer, transfer your music and video seamlessly - Enhance your shopping and entertainment experience on Amazon and more... Kindle Fire HD Manual: The Complete Guide To Getting The Most Out Of Your Kindle Device is a comprehensive step-by-step, no fluff guide to help you master your device in no time. Get it while it's still available at this low price! **Scroll to the top of the page and click the buy button on the right to download this book now!**

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

Kindertotenwald: Prose Poems


Franz Wright - 2011
    Wright’s most intimate thoughts and images appear before us in dramatic and spectral short narratives: mesmerizing poems whose colloquial sound and rhythms announce a new path for this luminous and masterful poet. In these journeys, we hear the constant murmured “yes” of creation—“it will be packing its small suitcase soon; it will leave the keys dangling from the lock and set out at last,” Wright tells us. He introduces us to the powerful presences in his world (the haiku master Basho, Nietzsche, St. Teresa of Avila, and especially his father, James Wright) as he explores the continually unfolding loss of childhood and the mixed blessings that follow it. Taken together, the pieces deliver the diary of a poet—“a fairly good egg in hot water,” as he describes himself—who seeks to narrate his way through the dark wood of his title, following the crumbs of language. “Take everything,” Wright suggests, “you can have it all back, but leave for a little the words, of all you gave the most mysteriously lasting.” With a strong presence of the dramatic in every line, Kindertotenwald pulls us deep into this journey, where we too are lost and then found again with him.

Everything a New Elementary School Teacher REALLY Needs to Know (But Didn't Learn in College)


Otis Kriegel - 2013
    Covered in glue, glitter, orange juice—or worse? Make a quick change into the spare set of clothes you keep on hand for just this purpose. Butterflies in your stomach before your first-ever Meet the Teacher Night? Keep your cool by writing the agenda on your board—it’ll double as a crib sheet for you. These tips and hundreds more, covering virtually every aspect of teaching, have all been learned the hard way: from real-life classroom experience. Otis Kriegel’s “little black book” will be a treasured resource for teachers who want not only to survive but to thrive in any situation.

Getting Started with Arduino


Massimo Banzi - 2008
    Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.

AWS Well-Architected Framework (AWS Whitepaper)


Amazon Web Services - 2015
    By using the Framework you will learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud.

Who Are You: The Life of Pete Townshend


Mark Wilkerson - 2006
    Author Mark Wilkerson interviewed Townshend himself and several of Townshend's friends and associates for this biography.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Music for the People: The Pleasures and Pitfalls of Classical Music


Gareth Malone - 2011
    In this funny, evocative, personal book, Gareth takes us on a journey of musical discovery that explains and entertains in equal measure. Over the course of three series of the Bafta award-winning The Choir, Gareth has unearthed a passion for classical music in schoolchildren, reluctant teenage boys, and even a whole town. With his infectious enthusiasm and gift for explanation, Gareth's very personal narrative takes you by the hand and leads you through a world of eccentric composers, flamboyant conductors, troubled geniuses and all the colourful personalities that make up the story of Classical Music. It will also provide a foundation of classical music understanding and give the reader the tools to appreciate a whole new world of music. So whether you want to expand your horizons, spend time with the great composers, introduce an almost infinite variety into your iPod playlist, or are just curious about what you might be missing out on, Music for The People will leave you entertained, informed and completely inspired.