Book picks similar to
Secure Programming with Static Analysis by Brian Chess
cs-theory
debugging
security
software
The Adobe Photoshop CS Book for Digital Photographers
Scott Kelby - 2003
This book covers topics which include the secrets of how the pros retouch portraits; how to color correct any photo without breaking a sweat (you'll be amazed at how they do it!); how to unlock the power of Photoshop CS' new features for digital photo pros; and others.
Programming Entity Framework: DbContext
Julia Lerman - 2011
This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database
Teach Yourself C++
Herbert Schildt - 1992
It also gives readers the opportunity to test their understanding with multiple exercises. Readers can test their knowledge of individual concepts, and then test their comprehension of the topic in a larger setting.
Erin's Hero
Mary Kennedy - 2017
His mission was to go in, retrieve the hostage, and leave. But when he discovers that this hostage makes his heart beat a little faster will he be able to focus and save Erin? Erin has been playing right into her father's hands for years. The General always gets what he wants and unfortunately for Erin, right now that's her life. But when a handsome soldier rescues her, will she be able to hold it together long enough to save her own life or will she fall prey to another man?
THE WATCHERS: 6 Military Romance Bundle
Kristina Weaver - 2017
More than 300,000 words. Approximately 1,000 pages. NO CLIFFHANGERS. VERY STEAMY. You've been warned :) Titles in this series: Seducing the Storm I’m a soldier. I’m a hard man. I don’t do love and I don’t do cute but the moment I meet Lenny Coleman that is exactly what I get. The little doctor is a mess, a walking disaster and also my wet dream come to life. I should walk away and tell one of my men to protect the little doctor from the danger dogging her, but when Lenny makes me a proposition I can’t refuse and I finally get my hands on her…well the only taste I want more than my freedom is the good doctor, in my bed. Forever. Bringing down Jericho When someone shoots my house up and tries to hurt me I find that one hot bad boy with a grin so hot he scorches my drawers, is exactly what I need. Seems I’ve brought down the walls of Jericho and the man may just be exactly what my god girl heart desires. Flirting with Fire Blaze Peters is my brother’s best friend, a surly brute and possibly one of the sexiest men I have ever seen. When Jericho, my big bad brother, gets a bug up his butt about one small burglary and tiny murder attempt…I find Blaze on my doorstep and a whole lot of heat that won’t be satisfied unless I convince the big sexy soldier that resisting temptation is the last thing he wants to do. Landing King My name is Brett King. I don’t want a woman more than one night, maybe two if she gets the message that commitment ain’t happening. That’s how I live and I am more than happy to keep it that way. Until Kinsley Jacobs show up on my doorstep, the one woman who made me want more than one night. All Shook Up When a friend called and asked me to protect one of his employees, I thought this job would be a cake walk. I’d go in, find the person responsible for scaring Rosetta Mayhew and move on to my carefree existence and quick flings. What I get instead is a female Elvis impersonator and one night that permanently alters my very soul. Owning Trace Trace Matthews storms back into my life on a golden chariot and expects me to just forgive and forget the past? The man abandoned me years ago and broke my heart into jagged pieces that still make me bleed.
Real World Java EE Patterns--Rethinking Best Practices
Adam Bien - 2009
:-)
JASE (SEAL Investigations Book 1)
Lola Silverman - 2016
So when my commanding officer requested that I go check up on his baby sister, I was understandably less than thrilled. Just because Rachel’s roommate thinks that Rachel got herself kidnapped doesn’t make it true. Rachel is notorious for her bad decisions and I have no doubt that Rachel’s equally silly roommate has likely blown things way out of proportion. It took me less than a day to realize that Cassidy Cross is not an alarmist or a piece of brainless feminine fluff. The woman has a formidable brain, a fierce sense of loyalty, and a strong desire to find her friend. Of course, the task of finding Rachel might have been a hell of a lot easier if Cassidy would have backed off and just let me do my job. The woman is in my way every time I turn around. Her and that amazing body of hers are going to get us both killed. The woman might be so beautiful that my brain fogs over every time she smiles, but a woman has no place in my investigation. CASSIDY I’m not sure the phrase “sexist pig” quite covers the guy that Rachel’s older brother sent to help me find her. My roommate was kidnapped. I watched it happen for goodness sake and this man practically refuses to believe me until the bullets are flying and someone is trying to throw us off Rachel’s trail. Now I’m stuck with a hard headed classic American male who looks like he belongs on the cover of the military issue of GQ. How can the man be so incredibly attractive and annoying all at the same time? Of course I’d really better get my head on straight and stop worrying about how badly I want to kiss him and start thinking about who’s trying to kill us. Rachel doesn’t have much time and I refuse to give up. Surrender is not an option…
Come the Fall
Jolie Vines - 2019
Unless your new boss is alpha, Scottish, and built Autumn has taken her baby nephew and is fleeing for their lives. Almost reaching the safety of a small wintery Washington State town, she narrowly avoids a collision as her car spins out on ice. The other driver is a huge mountain man who speaks only in glares. The instant attraction is like nothing she has experienced, but she isn't hanging around, no matter the enticement to stay. Bull will never trust again, certainly not a single mother with secrets. But he can't stop the draw. Autumn's sass drives him to distraction, her body has him burning up. Working side by side with her at his bar every day is enough to awaken his protective side once again. But the past will always catch up with you, no matter how far you run or who you fall in love with on the way. Come the Fall features one hot alpha male and one strong heroine, and is a novella in the Marry the Scot world. Autumn features in Hero but this novella is entirely standalone.
Meditation for Warriors
Loren W. Christensen - 2013
Nor do you need to burn incense or rub crystals.This book shows you easy ways to meditate whenever and wherever you want—you’ll learn how to do it without anyone knowing—and still hang out with your military pals, cop buddies, and fellow martial arts students. You can still own a pit bull, drive a Harley, and share lies with your drinking buddies. The same is true whether you’re a firefighter, doorman, bodyguard, medic, or security officer. The simple fact is, meditation as taught within these pages, will make you a better warrior.
Core JavaServer Faces (Core Series)
David M. Geary - 2004
Now, Core JavaServer™ Faces–the #1 guide to JSF–has been thoroughly updated in this second edition, covering the latest feature enhancements, the powerful Ajax development techniques, and open source innovations that make JSF even more valuable. Authors David Geary and Cay Horstmann delve into all facets of JSF 1.2 development, offering systematic best practices for building robust applications, minimizing handcoding, and maximizing productivity. Drawing on unsurpassed insider knowledge of the Java platform, they present solutions, hints, tips, and “how-tos” for writing superior JSF 1.2 production code, even if you’re new to JSF, JavaServer Pages™, or servlets.The second edition’s extensive new coverage includes: JSF 1.2’s improved alignment with the broader Java EE 5 platform; enhancements to the JSF APIs; controlling Web flow with Shale; and using Facelets to replace JSP with XHTML markup. The authors also introduce Ajax development with JSF–from real-time validation and Direct Web Remoting to wrapping Ajax in JSF components and using the popular Ajax4jsf framework.This book will help you
Automate low-level details and eliminate unnecessary complexity in server-side development
Discover JSF best practices, ranging from effective UI design and style sheets to internationalization
Use JSF with Tiles to build consistent, reusable user interfaces
Leverage external services such as databases, LDAP directories, authentication/authorization, and Webservices
Use JBoss Seam to greatly simplify development of database-backed applications
Implement custom components, converters, and validators
Master the JSF 1.2 tag libararies, and extend JSF with additional tag libraries
Preface Acknowledgments Chapter 1: Getting Started Chapter 2: Managed Beans Chapter 3: Navigation Chapter 4: Standard JSF Tags Chapter 5: Data Tables Chapter 6: Conversion and Validation Chapter 7: Event Handling Chapter 8: Subviews and Tiles Chapter 9: Custom Components, Converters, and Validators Chapter 10: External Services Chapter 11: Ajax Chapter 12: Open Source Chapter 13: How Do I . . . Index
Big Data Now: 2012 Edition
O'Reilly Media Inc. - 2012
It's not just a technical book or just a businessguide. Data is ubiquitous and it doesn't pay much attention toborders, so we've calibrated our coverage to follow it wherever itgoes.In the first edition of Big Data Now, the O'Reilly team tracked thebirth and early development of data tools and data science. Now, withthis second edition, we're seeing what happens when big data grows up:how it's being applied, where it's playing a role, and theconsequences -- good and bad alike -- of data's ascendance.We've organized the second edition of Big Data Now into five areas:Getting Up to Speed With Big Data -- Essential information on thestructures and definitions of big data.Big Data Tools, Techniques, and Strategies -- Expert guidance forturning big data theories into big data products.The Application of Big Data -- Examples of big data in action,including a look at the downside of data.What to Watch for in Big Data -- Thoughts on how big data will evolveand the role it will play across industries and domains.Big Data and Health Care -- A special section exploring thepossibilities that arise when data and health care come together.
Statistics for Six SIGMA Made Easy
Warren Brussee - 2004
Yet although the heart of Six Sigma is statistics, most books on Six Sigma give a general overview, with little detail on actually Using the Six Sigma tools. Books that cover Six Sigma statistics typically are 500+ pages and cost near USD100. Basic Statistics for Six Sigma gives the information needed to apply the statistical tools of Six Sigma to real-world problems in a simplified, USD24.95 paperback format, for Greenbelts and Six Sigma Project Team Leaders. A typical company's Greenbelt training in Six Sigma includes 7 books, 4 software packages, and 3 weeks of class work. It is very extensive in statistics. Although this kind of course is excellent, not all companies or individuals want to commit to that level of instruction. Statistics for Six Sigma--Made Easy! describes only the tools used by most successful Six Sigma practitioners. The only software package needed is Excel, and the 14 formulas and 5 tables included in the book enable you to use all the basic Six Sigma statistical tools. Using these tools will enable a person t
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!
Moscow, Midnight
John Cody Fidler-Simpson - 2018
The coroner rules it an accident, a sex game gone wrong. Jon Swift is from the old stock of journos - cynical, cantankerous and overweight - and something about his friend's death doesn't seem right. Then days after Macready's flat is apparently burgled, Swift discovers that his friend had been researching a string of Russian government figures who had met similarly 'accidental' fates. When the police refuse to investigate further, Swift gets in touch with his contacts in Moscow, determined to find out if his hunch is correct. Following the lead, he is soon drawn into a violent underworld, where whispers of conspiracies, assassinations and double-agents start blurring the line between friend and foe.But the truth will come at a price, and it may cost him everything.
CISSP for Dummies [With CDROM]
Lawrence C. Miller - 2002
The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertiseCD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versions"CISSP For Dummies, 3rd Edition" can lead you down the rough road to certification successNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.