The Man with the Golden Gun


Jim Lawrence - 2004
    With his conditioning removed, M sends Bond on a deadly mission; to track down Francisco Scaramanga, "The Man with the Golden Gun". But with a KGB agent & the usual quota of beautiful, treacherous girls in his path, will Bond survive? Also features "The Living Daylights" plus background on Ian Fleming & a foreword by his niece, Lucy Fleming.

Amazon Elastic Compute Cloud (EC2) User Guide


Amazon Web Services - 2012
    This is official Amazon Web Services (AWS) documentation for Amazon Compute Cloud (Amazon EC2).This guide explains the infrastructure provided by the Amazon EC2 web service, and steps you through how to configure and manage your virtual servers using the AWS Management Console (an easy-to-use graphical interface), the Amazon EC2 API, or web tools and utilities.Amazon EC2 provides resizable computing capacity—literally, server instances in Amazon's data centers—that you use to build and host your software systems.

The Island of Dr Moreau


Fiona Beddall - 2007
    I drifted very slowly to the eastward, approaching the island slantingly; and presently I saw, with hysterical relief, the launch come round and return towards me.

The Call of Cthulhu, Dagon, and Other Stories: Official Edition


H.P. Lovecraft - 2019
    Lovecraft includes the following stories: The Call of Cthulhu, Dagon, Celephais, The Shadow Out of Time. These are the original texts without any change, additions, notes, prologue, or censorship. The official texts as they were published by the author.

AWS Lambda: A Guide to Serverless Microservices


Matthew Fuller - 2016
    Lambda enables users to develop code that executes in response to events - API calls, file uploads, schedules, etc - and upload it without worrying about managing traditional server metrics such as disk space, memory, or CPU usage. With its "per execution" cost model, Lambda can enable organizations to save hundreds or thousands of dollars on computing costs. With in-depth walkthroughs, large screenshots, and complete code samples, the reader is guided through the step-by-step process of creating new functions, responding to infrastructure events, developing API backends, executing code at specified intervals, and much more. Introduction to AWS Computing Evolution of the Computing Workload Lambda Background The Internals The Basics Functions Languages Resource Allocation Getting Set Up Hello World Uploading the Function Working with Events AWS Events Custom Events The Context Object Properties Methods Roles and Permissions Policies Trust Relationships Console Popups Cross Account Access Dependencies and Resources Node Modules OS Dependencies OS Resources OS Commands Logging Searching Logs Testing Your Function Lambda Console Tests Third-Party Testing Libraries Simulating Context Hello S3 Object The Bucket The Role The Code The Event The Trigger Testing When Lambda Isn’t the Answer Host Access Fine-Tuned Configuration Security Long-Running Tasks Where Lambda Excels AWS Event-Driven Tasks Scheduled Events (Cron) Offloading Heavy Processing API Endpoints Infrequently Used Services Real-World Use Cases S3 Image Processing Shutting Down Untagged Instances Triggering CodeDeploy with New S3 Uploads Processing Inbound Email Enforcing Security Policies Detecting Expiring Certificates Utilizing the AWS API Execution Environment The Code Pipeline Cold vs. Hot Execution What is Saved in Memory Scaling and Container Reuse From Development to Deployment Application Design Development Patterns Testing Deployment Monitoring Versioning and Aliasing Costs Short Executions Long-Running Processes High-Memory Applications Free Tier Calculating Pricing CloudFormation Reusable Template with Minimum Permissions Cross Account Access CloudWatch Alerts AWS API Gateway API Gateway Event Creating the Lambda Function Creating a New API, Resource, and Method Initial Configuration Mapping Templates Adding a Query String Using HTTP Request Information Within Lambda Deploying the API Additional Use Cases Lambda Competitors Iron.io StackHut WebTask.io Existing Cloud Providers The Future of Lambda More Resources Conclusion

An Introduction to APIs


Brian Cooksey - 2016
    We start off easy, defining some of the tech lingo you may have heard before, but didn’t fully understand. From there, each lesson introduces something new, slowly building up to the point where you are confident about what an API is and, for the brave, could actually take a stab at using one.

A Sword of Truth Set: Richard and Kahlan:


Terry Goodkind - 2017
    The machine awakens to begin issuing a series of increasingly alarming, if minor, omens. The omens turn out to be astonishingly accurate, and ever more ominous. As Zedd tries to figure out how to destroy the sinister device, the machine issues a cataclysmic omen involving Richard and Kahlan, foretelling an impending event beyond anyone's ability to stop. Richard Rahl and Kahlan Amnell must defend themselves and their followers from a series of terrifying threats. Other Tor Books by Terry Goodkind The Sword of Truth Wizard’s First Rule Stone of Tears Blood of the Fold Temple of the Winds Soul of the Fire Faith of the Fallen The Pillars of Creation Naked Empire Debt of Bones Chainfire Phantom Confessor The Nicci Chronicles Death’s Mistress Shroud of Eternity At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.

Double Lucky: Goddess of Vengeance and Drop Dead Beautiful


Jackie Collins - 2015
     DROP DEAD BEAUTIFUL From Miami to Beverly Hills, from Mexico City to Acapulco to Las Vegas, dynamically sexy Lucky Santangelo and sweet-as-sin daughter, Max, are turning up the heat. So is Anthony Bonar, the son of Lucky's one-time godfather and lethal enemy, Enzio Bonatti. Lucky is preparing for the opening of her multibillion-dollar hotel complex in Las Vegas, The Keys, but Bonar-a vicious killer-is out to stop her any way he can. Meanwhile, sixteen-year-old Max has run off to Big Bear with a man she's met on the Internet. But he turns out to be a vengeful predator with a long-standing grudge against Lucky... So begins a non-stop thrill ride as Lucky builds her dream resort-and Max follows her dreams, and proves she's more than just a little Lucky. She's a kick-ass survivor. GODDESS OF VENGEANCE Passion. Beauty. Brains. Success. Lucky has everything her name implies. And as the force behind a high-profile casino and hotel complex, Lucky has exactly what billionaire businessman Armand Jordan is determined to take from her-and he's not afraid to play dirty. Meantime, Lucky's son Bobby is dealing with shady Russian investors and a hot new girlfriend, who happens to be a deputy D.A. While teenage Max is busy embarking on an affair with a sexy young movie star. It's business as usual for the Santangelo clan...But this time, it just might take more than Lady Luck for them all to come out on top.Jackie Collins knows a thing or two about life in the fast lane [with] her wry sense of humor and spitfire approach. -BazaarThis edition of the book is the deluxe, tall rack mass market paperback.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Friction Free Preview Edition (First 5 Chapters)


Sandra Brown - 2015
     A Texas Ranger, relegated to deskwork due to past recklessness, petitions to regain custody of his five-year-old daughter, and his case is assigned to a family court judge who is as attractive as she is ambitious. When a masked gunman barges in during the custody hearing with his sights on the judge, the Ranger reacts instinctually and goes after him. But authorities apprehend the wrong man, and the real gunman remains unknown, at large, and a threat. Will this take-charge lawman jeopardize his chances of custody by going after the would-be assassin? And will this unlikely pair be able to deny the forbidden attraction building between them?

Thinking in C++


Bruce Eckel - 1995
    It shows readers how to step back from coding to consider design strategies and attempt to get into the head of the designer.

Sense and Sensibility


Cherry Gilchrist - 1811
    [Penguin Readers Level 3]

Fundamentals of Digital Image Processing


Anil K. Jain - 1988
    Includes a comprehensive chapter on stochastic models for digital image processing. Covers aspects of image representation including luminance, color, spatial and temporal properties of vision, and digitization. Explores various image processing techniques. Discusses algorithm development (software/firmware) for image transforms, enhancement, reconstruction, and image coding.

Graph Theory With Applications To Engineering And Computer Science


Narsingh Deo - 2004
    GRAPH THEORY WITH APPLICATIONS TO ENGINEERING AND COMPUTER SCIENCE-PHI-DEO, NARSINGH-1979-EDN-1

Go in Practice


Matt Butcher - 2015
    Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific strategies you can use in your day-to-day applications. You'll learn techniques for building web services, using Go in the cloud, testing and debugging, routing, network applications, and much more.