Java SE 6: The Complete Reference


Herbert Schildt - 2006
    He includes information on Java Platform Standard Edition 6 (Java SE 6) and offers complete coverage of the Java language, its syntax, keywords, and fundamental programming principles.

Widow Maker: A Novel of World War II


E.R. Johnson - 2012
    The B-26--dubbed Widow Maker by the press and the aircrews who flew her--was one of the most controversial aircraft produced in the United States during the war. These young men find themselves confronted not only with doubts about the airplane they are given to fly, but also the sometimes fatal choices made by a military organization unprepared to employ them in combat. Against the setting of World War II Europe, the heart and minds of these young men are revealed as they are forces to make a swift and frequently terrifying journey into manhood. The differences between them, seemingly irreconcilable at first, fade away as they form the ancient bond between men whose lives must depend upon one another in combat. But even after these young Americans make the transition into seasoned warriors, they are still faced with the grim reality that some of them will survive--and some will not.

Microsoft Project 2010 Step by Step


Carl Chatfield - 2010
    With Step By Step, you set the pace-building and practicing the skills you need, just when you need them! Topics include building a project plan and fine-tuning the details; scheduling tasks, assigning resources, and managing dependencies; monitoring progress and costs; keeping projects on track; communicating project data through Gantt charts and other views.

Cognitive Behavioral Therapy: CBT Essentials and Fundamentals


Jonny Bell - 2014
    In our modern world, we see people struggling with depression, anxiety, anger, etc. Psychologist and counselors have been using Cognitive Behavioral Therapy to solve all these struggles. A Practical Guide to CBT and Modern Psychology will allow anyone to use CBT in their lives. It doesn't matter whether or not you have a background in Psychology. In this comprehensive guide you will learn all the fundamentals used in CBT by therapists. Inside you will be exposed to the following: CBT History Techniques When and How to use CBT Examples Methods to help others with psychological struggles And much more If you're ready to understand and use the powerful techniques of Cognitive Behavioral Therapy, then this is an excellent guide.

Song Maps: A New System to Write Your Best Lyrics


Simon Hawkins - 2016
     Does any of the following sound familiar? - You worry that the lyrics you write just don't deliver their full potential but can't figure out why, even though technically they tick all the right boxes. - You have great ideas but your finished lyrics somehow fall short of the emotional impact you wanted and, as a result, your songs get passed over. - You have a busy schedule with limited time to write and have wasted too many hours chasing un-writable lyric ideas. - You wonder how some professional songwriters always seem to get a particular dynamic in their lyrics, consistently writing songs better than 90% of what you hear on the radio. - You are perhaps nervous about going into a pro co-writing session because you fear your ideas aren't worth bringing into the writing room. - You know you have so many great titles waiting to be written but haven't found a way of systematically developing them into well-crafted lyrics. - After writing an amazing hooky Chorus and a great supporting first Verse, you hit the dreaded wall that is “second verse curse”. In Song Maps – A New System to Write Your Best Lyrics, I deliver simple, logical, well-defined solutions to these issues and more: I give you seven well-developed professional templates for you to bring your lyrics to life. I also provide you with a tried and tested process for writing lyrics using Song Maps. And I'll reveal the songwriter’s secret weapon. Much of this book contains new material. This is because, while I enjoyed building a firm foundation of knowledge about the craft from the songwriting programs at Berklee Music School and other sources, I discovered Song Maps afterwards, from my experience as a professional songwriter, writing either on my own or in the writing rooms of Nashville. Having been signed as a staff songwriter at Universal Music Publishing in Nashville, being nominated and winning awards for my songs including Grammys, Doves and hymn-writing awards, and after spending many years studying thousands of techniques and developing them in my own songwriting and in the writing room, I've had the privilege of teaching the material in this book to hundreds of songwriters and seeing a step change in their writing. I have been blessed to watch them find their authentic voice in writing ideas to their full potential, helping them achieve their dream to move from writing flat 2D lyrics to fabulous High Definition full-color 3D lyrics. As you assimilate Song Maps into your writing workflow, your songwriting will shift away from tentative, self-conscious, inhibited writing to strong, bold, intentional and vulnerable writing that does full justice to your original ideas, ultimately allowing you to make the impact you deserve as a songwriter. If you implement the simple, easy-to-understand concepts in this book, I promise you your songs will be better crafted than 90% of the songs you hear on the radio. It will also transform your effectiveness as a co-writer. Importantly, no matter where your songs end up, you will be confident you have written a brilliant lyric and you have served your co-writers well. Let this book help you transform your lyric writing by using Song Maps in your songwriting workflow and take your song ideas to their ultimate potential by writing your best, truly golden, spectacular songs.

Guerrilla Home Recording: How to Get Great Sound from Any Studio {No Matter How Weird or Cheap Your Gear Is}


Karl Coryat - 2004
    The revised edition is updated with a greater focus on digital recording techniques, the most powerful tools available to the home recordist. There are chapters devoted to instrument recording, humanizing drum patterns, mixing with plug-ins and virtual consoles, and a new section on using digital audio skills. And since, many true "Guerrillas" still record to analog tape, we have retained the best of that world. This edition features many more graphics than in the original edition, further enforcing Guerrilla Home Recording's reputation as the most readable, user-frienly recording title on the market.

Building Wireless Sensor Networks


Robert Faludi - 2010
    By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that delivers remotely sensed data.Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists.Investigate an assortment of practical and intriguing project ideasPrep your ZigBee toolbox with an extensive shopping list of parts and programsCreate a simple, working ZigBee network with XBee radios in less than two hours -- for under $100Use the Arduino open source electronics prototyping platform to build a series of increasingly complex projectsGet familiar with XBee's API mode for creating sensor networksBuild fully scalable sensing and actuation systems with inexpensive componentsLearn about power management, source routing, and other XBee technical nuancesMake gateways that connect with neighboring networks, including the Internet

Artificial Intelligence and Intelligent Systems


N.P. Padhy - 2005
    The focus of this text is to solve real-world problems using the latest AI techniques. Intelligent systems like expert systems, fuzzy systems, artificial neural networks, genetic algorithms and ant colony systems are discussed in detail with case studies to facilitate in- depth understanding. Since the ultimate goal of AI is the construction of programs to solve problems, an entire chapter has been devoted to the programming languages used in AI problem solving. The theory is well supported by a large number of illustrations and end-chapter exercises. With its comprehensive coverage of the subject in a clear and concise manner this text would be extremely useful not only for undergraduate students, but also to postgraduate students.

Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications


Bilgin Ibryam - 2019
    These modern architectures use new primitives that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huß from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud-native applications on Kubernetes.Each pattern includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud-native patterns.You'll learn about the following pattern categories:Foundational patterns cover the core principles and practices for building container-based cloud-native applications.Behavioral patterns explore finer-grained concepts for managing various types of container and platform interactions.Structural patterns help you organize containers within a pod, the atom of the Kubernetes platform.Configuration patterns provide insight into how application configurations can be handled in Kubernetes.Advanced patterns cover more advanced topics such as extending the platform with operators.

Junk to Gold: From Salvage to the World's Largest Online Auto Auction


Willis Johnson - 2014
    Willis Johnson, the founder of Copart [CPRT], offers up a personal and inspirational account of this journey to the top including lessons he learned from love, war and building a global, multi-billion dollar business. Even at the pinnacle of success, Willis remained grounded in his family-first values. His stories will inspire and provoke the entrepreneur in everyone to start building their dream.

The Fintech Book: The Financial Technology Handbook for Investors, Entrepreneurs and Visionaries


Susanne Chishti - 2016
    Written by prominent thought leaders in the global fintech investment space, this book aggregates diverse industry expertise into a single informative volume to provide entrepreneurs, bankers and investors with the answers they need to capitalize on this lucrative market. Key industry developments are explained in detail, and critical insights from cutting-edge practitioners offer first-hand information and lessons learned.The financial technology sector is booming, and entrepreneurs, bankers, consultants, investors and asset managers are scrambling for more information: Who are the key players? What's driving the explosive growth? What are the risks? This book collates insights, knowledge and guidance from industry experts to provide the answers to these questions and more.Get up to speed on the latest industry developments Grasp the market dynamics of the 'fintech revolution' Realize the sector's potential and impact on related industries Gain expert insight on investment and entrepreneurial opportunities The fintech market captured over US$14 billion in 2014, a three-fold increase from the previous year. New startups are popping up at an increasing pace, and large banks and insurance companies are being pushed toward increasing digital operations in order to survive. The financial technology sector is booming and The FINTECH Book is the first crowd-sourced book on the subject globally, making it an invaluable source of information for anybody working in or interested in this space.

Dictionary of Theories


Jennifer Bothamley - 1993
    Organized alphabetically, coverage extends from the arts to economics, history, linguistics, philosophy, psychology, sociology and on through the hard sciences. Ancient and modern, accepted and discredited, all theories which have relevance in today's world are included. The depth of the terms varies from undergraduate level to the more populist, with theories such as Parkinson's Law and the Peter Principle included.

Raspberry Pi Cookbook


Simon Monk - 2013
    In this cookbook, prolific hacker and author Simon Monk provides more than 200 practical recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino.You’ll also learn basic principles to help you use new technologies with Raspberry Pi as its ecosystem develops. Python and other code examples from the book are available on GitHub. This cookbook is ideal for programmers and hobbyists familiar with the Pi through resources such as Getting Started with Raspberry Pi (O’Reilly).Set up and manage your Raspberry PiConnect the Pi to a networkWork with its Linux-based operating systemUse the Pi’s ready-made softwareProgram Raspberry Pi with PythonControl hardware through the GPIO connectorUse Raspberry Pi to run different types of motorsWork with switches, keypads, and other digital inputsHook up sensors for taking various measurementsAttach different displays, such as an LED matrixCreate dynamic projects with Raspberry Pi and Arduino Make sure to check out 10 of the over 60 video recipes for this book at: http://razzpisampler.oreilly.com/ You can purchase all recipes at:

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Swift Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides)


Matthew Mathias - 2015
    Throughout the book, the authors share their insights into Swift to ensure that you understand the hows and whys of Swift and can put that understanding to use in different contexts. After working through the book, you will have the knowledge and confidence to develop your own solutions to a wide range of programming challenges using Swift.