Object Oriented Programming With C++


E. Balagurusamy - 1994
    

Bad Blood: Lucius Dodge and the Redlands War (Lucius Dodge Westerns Book 2)


J. Lee Butts - 2005
    Caught in the crossfire, it’s everything Lucius and Boz can do to save Ruby from the slaughter and bring her back alive. Only thing is, they have to save themselves first . . .“A writer who can tell a great adventure with authority and wit.” —John S. McCord, author of the Baynes Clan novels“One of the top writers of Westerns working in the genre today.” —Peter BrandvoldAbout the Author:J. Lee Butts is the author of 22 published books and numerous magazine articles and short works. His book Brotherhood of Blood was runner-up for the Western Writers of America Spur Award in 2005. He’s worn many hats over the years (teacher, administrator, pool manager, IBM supervisor, and western author), and he and his late wife lived everywhere from Los Angeles to Dallas. Currently he’s hanging those hats back in White Hall, Arkansas.

Catia V5 R17 For Designers


Sham Tickoo - 2005
    The textbook covers all-important workbenches of CATIA V5R17 with a thorough explanation of all commands, options, and their applications to create real-world products. About 55 mechanical engineering industry examples are used as tutorials and an additional 35 as exercises to ensure that the user can relate their knowledge and understand the design techniques used in the industry to design a product. After reading the textbook, the user will be able to create solid parts, assemblies, drawing views with bill of materials, surface models, and Sheet metal components. Also, the user will learn the editing techniques that are essential to make a successful design. In this book, the author emphasizes on the solid modeling techniques that improve the productivity and efficiency of the user. Salient Features of the Textbook Consists of 15 chapters that are organized in a pedagogical sequence. These chapters cover the Sketching, Modeling, Assembly, Drafting, Wireframe and Surface Design, and Generative Sheetmetal workbenches of CATIA V5R17. The first page of every chapter summarizes the topics that will be covered in it. Additional information is provided throughout the book in the form of tips and notes. Self-evaluation test and review questions are provided at the end of each chapter so that the users can assess their knowledge.Free Teaching and Learning Resources Online technical support by contacting techsupport@cadcim.com. All programs used in exercises and examples. Customizable PowerPoint presentations of all chapters in the textbook li>Instructor s Guide with solutions to all review questions and exercises in the textbook. Student projects to enhance the skills Class tests that can be used by faculty in the class To access these free teaching resources, please send your contact information to sales@cadcim.com, mentioning clearly your name, designation, university/college, street street address, city, state, zip, and country.

Mastering Algorithms with Perl


Jon Orwant - 1999
    Computer scientists have identified many techniques that a wide range of programs need, such as: Fuzzy pattern matching for text (identify misspellings!) Finding correlations in data Game-playing algorithms Predicting phenomena such as Web traffic Polynomial and spline fitting Using algorithms explained in this book, you too can carry out traditional programming tasks in a high-powered, efficient, easy-to-maintain manner with Perl.This book assumes a basic understanding of Perl syntax and functions, but not necessarily any background in computer science. The authors explain in a readable fashion the reasons for using various classic programming techniques, the kind of applications that use them, and -- most important -- how to code these algorithms in Perl.If you are an amateur programmer, this book will fill you in on the essential algorithms you need to solve problems like an expert. If you have already learned algorithms in other languages, you will be surprised at how much different (and often easier) it is to implement them in Perl. And yes, the book even has the obligatory fractal display program.There have been dozens of books on programming algorithms, some of them excellent, but never before has there been one that uses Perl.The authors include the editor of The Perl Journal and master librarian of CPAN; all are contributors to CPAN and have archived much of the code in this book there."This book was so exciting I lost sleep reading it." Tom Christiansen

The Organic Chem Lab Survival Manual: A Student's Guide to Techniques


James W. Zubrick - 1984
    The eighth edition has been revised to include updated coverage of NMR Spectroscopy and UV spectroscopy. New questions at the end of chapters reinforce the skills and techniques learned. Emphasis is placed on green chemistry in the lab, focusing on the more environmentally friendly materials that can be used. In addition, updated discussions are included on safety, distillation, gas chromatography, and liquid chromatography. This gives organic chemists the most up-to-date information to enhance their lab skills.

A Man Called Masters


Lucy Walker - 1973
    After years in the city, she is back in the desert country where she spent the happiest years of her childhood.The only cloud on her horizon is Masters. Handsome, but silent and as cold as ice, her new employer frightens Penny—and fascinates her...

Elements of Physical Chemistry


Peter Atkins - 1992
    This edition is designed to attain a thorough understanding of this vital branch of chemistry.

Kilimanjaro: A Trekking Guide to Africa's Highest Mountain (Includes Guides to Nairobi & Dar Es Salaam)


Henry Stedman - 2003
    This guide to treks and excursions around Kilimanjaro provides information on getting to Kilimanjaro from Europe, North America and Australasia, trekking preparations, where to stay and eat along the trails, employing a guide or porter, the environment and health and safety.

Most Effective Natural Cures on Earth: The Surprising Unbiased Truth about What Treatments Work and Why


Jonny Bowden - 2008
    Through his personal use, extensive research, and wide-ranging expertise in nutrition and health, Jonny sorts through the myriad home remedies from every discipline and tradition to show which work and how best to use these proven healing techniques. He also explains through approachable and articulate descriptions why they work and on what basis he selected these cures -- whether it is patient testimonials or the latest scientific studies to give you peace of mind and the information you need about each treatment.The book explores more than 75 common conditions, including allergies, cancer, high cholesterol, depression, diabetes, hypertension, menopause, and stress.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Surgical Recall


Lorne H. Blackbourne - 2002
    A perfect fit for a lab coat pocket, this book is commonly used as a quick review prior to surgical rounds as well as for board review.Purchasers of this edition will get both the print book and access to MP3 audio files of the entire text. All Q&A material will also be posted online in the form of electronic flashcards for self-quizzing.

The Hobbyist's Guide to the RTL-SDR: Really Cheap Software Defined Radio


Carl Laufer - 2014
    The RTL-SDR is a super cheap software defined radio based on DVB-T TV dongles that can be found for under $20. This book is about tips and tutorials that show you how to get the most out of your RTL-SDR dongle. Some projects described in this book are also compatible with other wideband SDRs like the HackRF, Airspy and SDR Play. What's in the book Learn how to set up your RTL-SDR with various free software defined radio programs such as SDR#, HDSDR, SDR-Radio and more. Learn all the little tricks and oddities that the dongle has. A whole chapter dedicated to improving the RTL-SDR's performance. Dozens of tutorials for fun RTL-SDR based projects such as ADS-B aircraft radar, AIS boat radar, ACARS decoding, receiving NOAA and Meteor-M2 weather satellite images, listening to and following trunked radios, decoding digital voice P25/DMR signals, decoding weather balloon telemetry, receiving DAB radio, analysing GSM and listening to TETRA signals, decoding pagers, receiving various HF signals such as ham radio modes, weatherfax and DRM radio, decoding digital D-STAR voice, an introduction to GNU Radio, decoding RDS, decoding APRS, measuring filters and SWR with low cost equipment, and many many more projects! Guide to antennas, cables and adapters. This book is updated every 3-4 months to ensure information is fresh and up to date. Updates are available for free for all customers. Note: To update the book you must manually contact Kindle support and request the update. Last updated to edition 4.1 on 15 June 2015.

Eliza's Child


Maggie Hope - 2015
    But then he loses their home and abandons her, leaving Eliza with no choice but to return to her parents’ house.She inadvertently attracts the attention of the ruthless mine owner Jonathan Moore. But can she sacrifice her reputation to protect her son?

Hardy Boys


Spotlight Productions
    Read the great reviews for these dynamic new titles. Expect more titles to come.

The CEO'S Assistant


Iona Rose - 2021