Book picks similar to
Microsoft® Windows Server™ 2003 Inside Out by William R. Stanek
technology
unread
computer
cs-reference-windows
Comptia A+ Certification All-In-One Exam Guide: Exams 220-801 & 220-802
Mike Meyers - 2012
Offers a review of the examination that includes test-taking strategies, discussion of relevant concepts, practice questions, and detailed answers.
Gwen's Honor
Sandra Wilkins - 2013
Although engaged to Walter Manning for more than two years, she has lived away from him and worked as a society reporter for the Shawnee Globe. But an unexpected reconnection with the handsome Josh Flynn, her childhood sweetheart, leads to jealousy from Walter. Gwen insists that she loves Walter and would never be so dishonorable as to break off her engagement…Yet she can't brush off the feeling that her lack of enthusiasm and mounting pressure from wedding preparations are pointing her in a different direction—one that would shake her comfortable life to its foundation. Faced with an impossible decision, Gwen must choose between honor and love in this historical romance set in the Oklahoma Territory.
Minecraft: Diary of a Minecraft Creeper
Diary Wimpy - 2015
What kind of mischief will he get into? Will he win his father's approval and cause more destruction than any creeper in history? This diary book is a great read or gift for a Minecraft lover of any age! *** Read It FREE With Kindle Unlimited Or Prime Membership *** Don't have kindle? No worries! Read it on your PC, Mac, Tablet Or Smartphone! *** Download Your Copy Or Read It FREE With Kindle Unlimited Or Prime Membership ***
The Best Couple Ever
Novoneel Chakraborty - 2018
If yes, then congrats! You are their next target.
Cilka's Journey / The Librarian of Auschwitz / The Tattooist of Auschwitz
Heather Morris - 2019
The Commandant at Birkenau, Schwarzhuber, notices her long beautiful hair, and forces her separation from the other women prisoners. Cilka learns quickly that power, even unwillingly given, equals survival.After liberation, Cilka is charged as a collaborator by the Russians and sent to a desolate, brutal prison camp in Siberia known as Vorkuta, inside the Arctic Circle. The Librarian of Auschwitz: Fourteen-year-old Dita is one of the many imprisoned by the Nazis at Auschwitz. Taken, along with her mother and father, from the Terezín ghetto in Prague, Dita is adjusting to the constant terror that is life in the camp. When Jewish leader Freddy Hirsch asks Dita to take charge of the eight precious books the prisoners have managed to smuggle past the guards, she agrees. The Tattooist of Auschwitz: In 1942, Lale Sokolov arrived in Auschwitz-Birkenau. He was given the job of tattooing the prisoners marked for survival - scratching numbers into his fellow victims' arms in indelible ink to create what would become one of the most potent symbols of the Holocaust.Waiting in line to be tattooed, terrified and shaking, was a young girl. For Lale - a dandy, a jack-the-lad, a bit of a chancer - it was love at first sight. And he was determined not only to survive himself, but to ensure this woman, Gita, did, too.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
I'm Dead. Now What?: Important Information about My Belongings, Business Affairs, and Wishes
Peter Pauper Press - 2014
Use it to gather those vital details about your contacts, legal matters, health, financial affairs, instructions, and more. Enter the information in this guided planner, and keep it in a secure location. Valuable and practical, it is a tremendous gift for your family and personal representatives. The I'm Dead, Now What? Planner covers: My Personal InformationMy Medical InformationKey Contact InformationAt the Time of My PassingMy DependentsImportant DocumentsFinancial InformationCommercial/Business InformationWhat Beneficiaries Can ExpectPersonal PropertyInsuranceMy PetsWhat to Pay, Close, and CancelEmail and Social MediaMiscellaneous InformationMy Personal WishesLast WordsNote: This planner is not a legal document and does not replace a valid will.
The Design of the UNIX Operating System
Maurice J. Bach - 1986
The leading selling UNIX internals book on the market.
Effective Python: 59 Specific Ways to Write Better Python
Brett Slatkin - 2015
This makes the book random-access: Items are easy to browse and study in whatever order the reader needs. I will be recommending "Effective Python" to students as an admirably compact source of mainstream advice on a very broad range of topics for the intermediate Python programmer. " Brandon Rhodes, software engineer at Dropbox and chair of PyCon 2016-2017" It s easy to start coding with Python, which is why the language is so popular. However, Python s unique strengths, charms, and expressiveness can be hard to grasp, and there are hidden pitfalls that can easily trip you up. " Effective Python " will help you master a truly Pythonic approach to programming, harnessing Python s full power to write exceptionally robust and well-performing code. Using the concise, scenario-driven style pioneered in Scott Meyers best-selling "Effective C++, " Brett Slatkin brings together 59 Python best practices, tips, and shortcuts, and explains them with realistic code examples. Drawing on years of experience building Python infrastructure at Google, Slatkin uncovers little-known quirks and idioms that powerfully impact code behavior and performance. You ll learn the best way to accomplish key tasks, so you can write code that s easier to understand, maintain, and improve. Key features includeActionable guidelines for all major areas of Python 3.x and 2.x development, with detailed explanations and examples Best practices for writing functions that clarify intention, promote reuse, and avoid bugs Coverage of how to accurately express behaviors with classes and objects Guidance on how to avoid pitfalls with metaclasses and dynamic attributes More efficient approaches to concurrency and parallelism Better techniques and idioms for using Python s built-in modules Tools and best practices for collaborative development Solutions for debugging, testing, and optimization in order to improve quality and performance "
A Theory of Fun for Game Design
Raph Koster - 2004
It features a novel way of teaching interactive designers how to create and improve their designs to incorporate the highest degree of fun. As the book shows, designing for fun is all about making interactive products like games highly entertaining, engaging, and addictive. The book's unique approach of providing a highly visual storyboard approach combined with a narrative on the art and practice of designing for fun is sure to be a hit with game and interactive designers.At first glance A Theory of Fun for Game Design is a book that will truly inspire and challenge game designers to think in new ways; however, its universal message will influence designers from all walks of life. This book captures the real essence of what drives us to seek out products and experiences that are truly fun and entertaining. The author masterfully presents his engaging theory by showing readers how many designs are lacking because they are predictable and not engaging enough. He then explains how great designers use different types of elements in new ways to make designs more fun and compelling. Anyone who is interested in design will enjoy how the book works on two levels--as a quick inspiration guide to game design, or as an informative discussion that details the insightful thinking from a great mind in the game industry.
Pro Git
Scott Chacon - 2009
It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.
The Way to Go: A Thorough Introduction to the Go Programming Language
Ivo Balbaert - 2012
"
The Tao of Twitter: Changing Your Life and Business 140 Characters at a Time
Mark W. Schaefer - 2011
Twitter may be the most powerful business and personal networking platform ever created but it remains a frustrating, strange world for most people. The Tao of Twitter is a path, a majestic random synergy with the potential to change your business and your life forever -- if you know the way! This is a book designed for busy people who can't spend hours in experimentation and research trying to find success. In one hour you will know enough strategies, tactics, and time-savers to create an effective presence on Twitter that will result in meaningful and measurable benefits. Through colorful examples and easy-to-follow, non-technical language, college educator and renowned marketing expert Mark Schaefer teaches you: > Secrets to building influence on Twitter > The formula behind every Twitter success > Applying Twitter for competititve advantage > A daily Twitter regimen > Specific business and personal benefits > 15 Ways to attract targeted followers ... plus hundreds of fresh ideas that will make Twitter fun and profitable. Jump-start your journey toward social media success by learning the Tao of Twitter!
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.