Vampire Kisses 1: The Beginning


Ellen Schreiber - 2011
    Dangerous first love. This is where it all begins...The mansion on top of Benson Hill has stood empty for years. But one day it seems to be occupied, and its mysterious, handsome inhabitant Alexander Sterling becomes the source of much talk around town. Raven, a vampire-obsessed Goth-girl who has always considered herself an outsider in 'Dullsville', is determined to uncover the truth surrounding the secretive Alexander. As she gets to know him, and their spark intensifies, Raven finds herself in some unanticipated situations. Vampire Kisses: The Beginning captures the thrill of a most unusual romance.Also available by Ellen Schreiber:Vampire Kisses 2: Kissing CoffinsVampire Kisses 3: VampirevilleVampire Kisses 4: Dance with a VampireVampire Kisses 5: The Coffin ClubVampire Kisses 6: Royal BloodVampire Kisses 7: Love BitesOnce in a Full Moon

GIS Tutorial 1: Basic Workbook


Wilpen L. Gorr - 2010
    By combining ArcGIS tutorials with self-study exercises intended to gradually build upon basic skills, the GIS Tutorial 1 is fully adaptable to individual needs, as well as the classroom setting. The tutorial demonstrates a range of GIS functionality, from creating maps and collecting data to using geoprocessing tools and models as well as ArcGIS 3D Analyst and ArcGIS Spatial Analyst extensions for further analysis. GIS Tutorial 1 includes a data CD for working through the exercises and fully functioning 180-day trial DVD of ArcGIS Desktop10 software, making it the smart choice for GIS beginners.

POISONED CHALICE: Mabel de Belleme Normandy's Wicked Lady (Medieval Babes: Tales of Little-Known Ladies Book 8)


J.P. Reedman - 2021
    

Data Science with R


Garrett Grolemund - 2015
    

What's New in Java 7?


Madhusudhan Konda - 2011
    Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Beginning Programming All-In-One Desk Reference for Dummies


Wallace Wang - 2007
    If programming intrigues you (for whatever reason), Beginning Programming All-In-One Desk Reference For Dummies is like having a starter programming library all in one handy, if hefty, book.In this practical guide, you'll find out about algorithms, best practices, compiling, debugging your programs, and much more. The concepts are illustrated in several different programming languages, so you'll get a feel for the variety of languages and the needs they fill.Inside you'll discover seven minibooks:Getting Started: From learning methods for writing programs to becoming familiar with types of programming languages, you'll lay the foundation for your programming adventure with this minibook. Programming Basics: Here you'll dive into how programs work, variables, data types, branching, looping, subprograms, objects, and more. Data Structures: From structures, arrays, sets, linked lists, and collections, to stacks, queues, graphs, and trees, you'll dig deeply into the data. Algorithms: This minibook shows you how to sort and search algorithms, how to use string searching, and gets into data compression and encryption. Web Programming: Learn everything you need to know about coding for the web: HyperText. Markup Language (better known simply as HTML), CSS, JavaScript, PHP, and Ruby. Programming Language Syntax: Introduces you to the syntax of various languages - C, C++, Java, C#, Perl, Python, Pascal, Delphi, Visual Basic, REALbasic - so you know when to use which one. Applications: This is the fun part where you put your newly developed programming skills to work in practical ways. Additionally, Beginning Programming All-In-One Desk Reference For Dummies shows you how to decide what you want your program to do, turn your instructions into "machine language" that the computer understands, use programming best practices, explore the "how" and "why" of data structuring, and more. And you'll get a look into various applications like database management, bioinformatics, computer security, and artificial intelligence. After you get this book and start coding, you'll soon realize that -- wow! You're a programmer!

Advanced Scala with Cats


Noel Welsh - 2017
    This means designing systems as small composable units, expressing constraints and interactions via the type system, and using composition to guide the construction of large systems in a way that maintains the original architectural vision.The book also serves as an introduction to the Cats library. We use abstractions from Cats, and we explain the structure of Cats so you can use it without fear in your own code base. The broad ideas are not specific to Cats, but Cats provides an excellent implementation that is beneficial to learn in its own right.

Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security


Brian W. Kernighan - 2017
    Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords.Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.

Advanced Swift


Chris Eidhof - 2016
    If you have read the Swift Programming Guide, and want to explore more, this book is for you.Swift is a great language for systems programming, but also lends itself for very high-level programming. We'll explore both high-level topics (for example, programming with generics and protocols), as well as low-level topics (for example, wrapping a C library and string internals).

Get Your Hands Dirty on Clean Architecture: A hands-on guide to creating clean web applications with code examples in Java


Tom Hombergs - 2019
    

The Winner by David Baldacci Summary & Study Guide


BookRags - 2011
    48 pages of chapter summaries, quotes, character analysis, themes, and more – everything you need to sharpen your knowledge of The Winner. This detailed literature summary also contains Topics for Discussion and a Free Quiz on The Winner by David Baldacci.

Wireless Communications: Principles and Practice


Theodore S. Rappaport - 1995
    Building on his classic first edition, Theodore S. Rappaport reviews virtually every important new wireless standard and technological development, including W-CDMA, cdma2000, UMTS, and UMC 136/EDGE; IEEE 802.11 and HIPERLAN WLANs; Bluetooth, LMDS, and more. Includes dozens of practical new examples, solved step by step.

21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole


Gigi - 2020
    Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.