Introducing Microsoft Power BI


Alberto Ferrari - 2016
    Stay in the know, spot trends as they happen, and push your business to new limits. This e-book introduces Microsoft Power BI basics through a practical, scenario-based guided tour of the tool, showing you how to build analytical solutions using Power BI. Get an overview of Power BI, or dig deeper and follow along on your PC using the book's examples.

Diseases without Borders: Boosting Your Immunity Against Infectious Diseases from the Flu and Measles to Tuberculosis


Michael Savage - 2015
    Michael Savage explains the origins of viruses and their impact on the U.S. With new and resurgent diseases resulting from unregulated immigration and a politicized public health system, Michael Savage sees the need for some changes - starting with the President and the Center for Disease Control telling us the truth. Savage makes his case for the government to enforce travel bans, the use of quarantines and the importance of proper border screenings. However, this is not a cure or treatment for any of these diseases. With Zika virus, tuberculosis, hepatitis, Enterovirus 68 and other new disease threats emerging across the U.S., Savage will explain ways to fortify your immune system and defend against these and other diseases. Drawing from his extensive training, Dr. Savage examines the benefits of using specific nutrients to boost the human immune system which, in turn, increases the odds of surviving a viral infection as well as preventing other diseases. Based on his knowledge of the politics of medicine being played by the Obama mandarins and his Ph.D. in Epidemiology and Nutrition from the University of California, Berkley, Dr. Savage presents solid information to protect your health. Whether you want to defend your body against deadly diseases, boost your immunity, or learn more about the government's impact on reemerging and imported diseases, DISEASES WITHOUT BORDERS is your source for informative, helpful, and potentially life-saving advice.

Core Memory: A Visual Survey of Vintage Computers


John Alderman - 2007
    Vivid photos capture these historically important machinesincluding the Eniac, Crays 13, Apple I and IIwhile authoritative text profiles each, telling the stories of their innovations and peculiarities. Thirty-five machines are profiled in over 100 extraordinary color photographs, making Core Memory a surprising addition to the library of photography collectors and the ultimate geek-chic gift.

The E. E. 'Doc' Smith Omnibus


E.E. "Doc" Smith - 2007
    Then the enemies are forced to become allies when everyone becomes lost in an unfamiliar region of the galaxy and must fight their way back through primative planets and against alien fleets. As always with Smith, romance and action are equally mixed. The Seaton is forced back into action to stop a menace that threatens every civilized planet in the galaxy, but to do it he must create the greatest starship ever conceived. Finally read Triplanetary, the story that helped launch the Lensmen series. A brainy man and heroic woman fight against ruthless space pirates for life and love.

AWS Security Best Practices (AWS Whitepaper)


Amazon Web Services - 2016
    It also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

The New Hot: Cruising Through Menopause with Attitude and Style


Meg Mathews - 2020
    Rejecting the idea that we should live in fear, suffer silently, or medicate ourselves unnecessarily through this hormonal shift, Mathews set out to get answers and advice from the medical establishment, alternative therapists, and her many friends in the midst of "the change." When she launched the Megs Menopause website, it quickly became the trending online destination for pre- and menopausal women all over the world.Now, in The New Hot, Mathews offers the results of all her research and discussions: the latest information about hormone treatments (hormone replacement therapy and bioidentical hormone therapy), her best tips and techniques for coping with menopausal symptoms (there are officially thirty-four possible symptoms; Mathews has dealt with thirty-two!), and dishy, girlfriend-to-girlfriend advice about what to really expect when you're aging. Entertaining, stylish, and informative, The New Hot will be the resource women everywhere are talking about, learning from, and recommending to one another.

Programming Entity Framework: DbContext


Julia Lerman - 2011
    This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users


Christopher Negus - 2007
    Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

The Digital Effect


Steve Perry - 1997
    Lee". He's helping a young lady whose boyfriend put his head in a stamping press. The Corporation calls it suicide. His lady friend calls it murder. Gil figures this rotating garbage can is rotten to the core. And now he has to flush it out, level by level before his discreet inquiries get him permanently spaced without a suit.

Jumping into C++


Alex Allain - 2013
    As a professional C++ developer and former Harvard teaching fellow, I know what you need to know to be a great C++ programmer, and I know how to teach it, one step at a time. I know where people struggle, and why, and how to make it clear. I cover every step of the programming process, including:Getting the tools you need to program and how to use them*Basic language feature like variables, loops and functions*How to go from an idea to code*A clear, understandable explanation of pointers*Strings, file IO, arrays, references*Classes and advanced class design*C++-specific programming patterns*Object oriented programming*Data structures and the standard template library (STL)Key concepts are reinforced with quizzes and over 75 practice problems.

Sexy Web Design


Elliott Jay Stocks - 2008
    You'll be guided through the entire process of creating a gorgeous, usable web site by applying the timeless principles of user-centered design.Even if you're short on design skills, with this book you'll be creating your own stunning web sites in no time at all.Throughout, the focus is on simple and practical techniques that anyone can use - you don't need to have gone to art school or have artistic flair to create stunning designs using the methods outlined in this book.The book's full-color layout and large format (8" x 10") make Sexy Web Design a pleasure to read.Master key web interface design principles Design amazing web interfaces from scratch Create beautiful, yet functional, web sites Unleash your artistic talents And much more Who should read this book? Whether you're completely new to web design, a seasoned pro looking for inspiration, or a developer wanting to improve your sites' aesthetics, there's something for everyone here.How? Because instead of trying to cover every possible area of creating a web site, we've focused purely on the design stage; that is, everything that happens before a single line of code is written.However, great design is more than just aesthetics. Long before we open our graphics program of choice, we'll be conducting research, dealing with clients, responding to briefs, sketching out sitemaps, planning information architecture, moving from doodles to diagrams, exploring different ways of interactivity, and building upon design traditions.But ultimately, you'll be finding out how to create web sites that look drop-dead gorgeous.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

The LogStash Book


James Turnbull - 2013
    We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.

HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications


Juan Diego Gauchat