OS X Lion: the Ars Review


John Siracusa - 2011
    

Advanced Apex Programming for Salesforce.com and Force.com


Dan Appleman - 2012
    Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.

Rise of the Data Cloud


Frank Slootman - 2020
    

IBM PC Assembly Language and Programming


Peter Abel - 1987
    Coverage starts from scratch, discussing the simpler aspects of the hardware, and the language, then introduces technical details and instructions as they are needed.

Mastering Vmware Vsphere 5


Scott Lowe - 2011
    You'll learn how to install, configure, operate, manage, and secure the latest release.Covers all the new features and capabilities of the much-anticipated new release of VMware vSphere Discusses the planning, installation, operation, and management for the latest release Reviews migration to the latest vSphere software Offers hands-on instruction and clear explanations with real-world examples Mastering VMware vSphere is the strategic guide you need to maximize the opportunities of virtualization.

Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry


Alan Wolk - 2015
    Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!


Lisa Morosky - 2012
    It also includes interviews with successful virtual assistants, interviews with clients who utilize a virtual assistant, resources at the end of most chapters, a 30-day reading guide and action plan, and access to The Bootstrap VA Facebook Group where readers can bounce ideas off of each other, ask Lisa questions, and get the support needed no matter where they are in the process of becoming and working as a virtual assistant.If you want to get started as a virtual assistant, and you're a go-getter looking to bootstrap your way to success, this is an eBook you can't afford to miss.ABOUT THE AUTHORLisa Morosky is the author of "The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!" and is a premier virtual assistant in the blogging, Internet marketing, social media, and online business realms. As the founder of VAforBloggers.com, Lisa worked with dozens of clients from 2009-2011, received mentions by and recommendations from top experts, spoke at the BlogWorld conference in Las Vegas, and built a business from the ground up. In 2011, Lisa made the decision to cut back, reposition her services and her client base, and spend more time on personal projects. She moved her services to her new, centralized home at The Home Life {and Me}, lowered her rates (to pass on her new savings to her clients), and changed her title to "blog helper". In 2012, Lisa launched her virtual assistant coaching services.In addition to being a virtual assistant and a virtual assistant coach, Lisa is a Christ follower, a proud wife to her amazing husband, a homemaker, a real foodie, and a lover of all things simple and natural. You can find her blogging about creating a simple, natural, faith-inspired home life at http://www.thehomelifeand.me.

Strength of Materials, Part 1 and Part 2


Stephen P. Timoshenko - 1983
    1: Elementary Theory and Problems contains the essential material that is usually covered in required courses of strength of materials in our engineering schools. Strength of Materials - Part. 2: Advanced Theory and Problems contains the later developments that are of practical importance in the fields of strength of materials, and theory of elasticity. Complete derivations of problems of practical interest are given in most cases. The books are illustrated with a number of problems to which solutions are presented. In many cases, the problems are chosen so as to widen the field covered by the text and to illustrate the application of the theory in the solution of design problems.

Service-Oriented Design with Ruby and Rails


Paul Dix - 2010
    Today, Rails developers and architects need better ways to interface with legacy systems, move into the cloud, and scale to handle higher volumes and greater complexity. In Service-Oriented Design with Ruby and Rails Paul Dix introduces a powerful, services-based design approach geared toward overcoming all these challenges. Using Dix's techniques, readers can leverage the full benefits of both Ruby and Rails, while overcoming the difficulties of working with larger codebases and teams. Dix demonstrates how to integrate multiple components within an enterprise application stack; create services that can easily grow and connect; and design systems that are easier to maintain and upgrade. Key concepts are explained with detailed Ruby code built using open source libraries such as ActiveRecord, Sinatra, Nokogiri, and Typhoeus. The book concludes with coverage of security, scaling, messaging, and interfacing with third-party services. Service-Oriented Design with Ruby and Rails will help you Build highly scalable, Ruby-based service architectures that operate smoothly in the cloud or with legacy systems Scale Rails systems to handle more requests, larger development teams, and more complex code bases Master new best practices for designing and creating services in Ruby Use Ruby to glue together services written in any language Use Ruby libraries to build and consume RESTful Web services Use Ruby JSON parsers to quickly represent resources from HTTP services Write lightweight, well-designed API wrappers around internal or external services Discover powerful non-Rails frameworks that simplify Ruby service implementation Implement standards-based enterprise messaging with Advanced Message Queuing Protocol (AMQP) Optimize performance with load balancing and caching Provide for security and authentication

AWS Well-Architected Framework (AWS Whitepaper)


Amazon Web Services - 2015
    By using the Framework you will learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud.

Mastering Algorithms with Perl


Jon Orwant - 1999
    Computer scientists have identified many techniques that a wide range of programs need, such as: Fuzzy pattern matching for text (identify misspellings!) Finding correlations in data Game-playing algorithms Predicting phenomena such as Web traffic Polynomial and spline fitting Using algorithms explained in this book, you too can carry out traditional programming tasks in a high-powered, efficient, easy-to-maintain manner with Perl.This book assumes a basic understanding of Perl syntax and functions, but not necessarily any background in computer science. The authors explain in a readable fashion the reasons for using various classic programming techniques, the kind of applications that use them, and -- most important -- how to code these algorithms in Perl.If you are an amateur programmer, this book will fill you in on the essential algorithms you need to solve problems like an expert. If you have already learned algorithms in other languages, you will be surprised at how much different (and often easier) it is to implement them in Perl. And yes, the book even has the obligatory fractal display program.There have been dozens of books on programming algorithms, some of them excellent, but never before has there been one that uses Perl.The authors include the editor of The Perl Journal and master librarian of CPAN; all are contributors to CPAN and have archived much of the code in this book there."This book was so exciting I lost sleep reading it." Tom Christiansen

Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking)


Andrew McKinnon - 2015
    It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Denial of Service or DoS Spoofing Techniques Mobile Hacking Hacking Tools Penetration Testing Passive Attacks If you are looking to venture into the world of hacking, this book will teach you all the information you need to know. When you download Hacking: Ultimate Hacking For Beginners - How to Hack, you'll discover how to acquire Many Powerful Hacking Tools. You'll also learn about Malware: A Hacker’s Henchman and Common Attacks And Viruses. You'll even learn about identity theft, how to protect yourself, and how hackers profit from this information! Read this book for FREE on Kindle Unlimited - Download NOW! Download Hacking: Ultimate Hacking For Beginners - How to Hack right away - This Amazing 4th Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, mobile hacking, and tips for ethical hacking. You'll even learn how to fight viruses and choose the right antivirus software for your system! Just scroll to the top of the page and select the Buy Button. Download Your Copy TODAY!

Rethinking the Internet of Things: A Scalable Approach to Connecting Everything


Francis Dacosta - 2013
    Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry

Can I Retire Yet?: How to Make the Biggest Financial Decision of the Rest of Your Life


Darrow Kirkpatrick - 2016
    You've reached major milestones and accumulated more assets than you dreamed possible, and yet you hesitate. “Can I retire?” This book will help answer that question by showing you…. The tools you need to live a secure and independent retirement, without worrying about money What you must know before leaving a career behind How much it will cost you to live in retirement, and how to manage your cash flow The current choices for retirement health care, including lesser-known but effective options The threat from inflation: two secrets that politicians and bankers will never admit A realistic assessment of the impact that income taxes will have on your retirement Social Security’s role in your retirement: when you should claim and how much it’s worth to you How to construct and manage an investment portfolio for income and growth in retirement About immediate annuities and why you need multiple sources of retirement income The key variables and unknowns in your retirement withdrawal equation Reviews of the best retirement calculators, and tips for how to use them accurately Beyond the simplistic 4% Rule to the latest research on safe withdrawal rates Realistic bracketing of your retirement savings needs, without over caution or overconfidence The history of economic cycles and the related asset classes for optimal retirement security A survey of strategies plus original research for how to orchestrate your retirement distributions A practical retirement fuel gauge alerting you to problems while you still have time to act Backup plans: the lifeboat strategies for ensuring you'll never be without essential income The 6 crucial questions to answer before you can retire The one, simple, powerful, non-financial reason that you can and should retire earlier than later