JavaScript Patterns


Stoyan Stefanov - 2010
    If you're an experienced developer looking to solve problems related to objects, functions, inheritance, and other language-specific categories, the abstractions and code templates in this guide are ideal -- whether you're writing a client-side, server-side, or desktop application with JavaScript.Written by JavaScript expert Stoyan Stefanov -- Senior Yahoo! Technical and architect of YSlow 2.0, the web page performance optimization tool -- JavaScript Patterns includes practical advice for implementing each pattern discussed, along with several hands-on examples. You'll also learn about anti-patterns: common programming approaches that cause more problems than they solve.Explore useful habits for writing high-quality JavaScript code, such as avoiding globals, using single var declarations, and moreLearn why literal notation patterns are simpler alternatives to constructor functionsDiscover different ways to define a function in JavaScriptCreate objects that go beyond the basic patterns of using object literals and constructor functionsLearn the options available for code reuse and inheritance in JavaScriptStudy sample JavaScript approaches to common design patterns such as Singleton, Factory, Decorator, and moreExamine patterns that apply specifically to the client-side browser environment

Helping You to Identify and Understand Autism Masking: The Truth Behind the Mask


Emma Kendall - 2020
    That’s because, autism spectrum disorders are complex and unique to each and every individual.Emma Kendall is diagnosed with an autism spectrum disorder and holds a first-class degree in Autism: Special Education. In addition to this, her qualifications include Counselling, Communication and Personal Skills.Whilst at university, Emma studied and researched the social behaviour which is commonly referred to as autism masking or camouflaging. This required her to interact with and question autistic people to gain a clear understanding of this diverse topic.Emma shares her unique insights and personal experiences describing what autism masking is. She also reveals the intriguing motives for the use of this behaviour. Explaining how autistic people do this and why, and to what extent the mask is relied upon, as well as, uncovering fascinating details concerning the after effects and the long-term impact of autism masking.Emma is the author of Perfectly Autistic and Autistic Christmas!

Rocket Surgery Made Easy: The Do-It-Yourself Guide to Finding and Fixing Usability Problems


Steve Krug - 2009
    But with a typical price tag of $5,000 to $10,000 for a usability consultant to conduct each round of tests, it rarely happens. In this how-to companion to Don't Make Me Think: A Common Sense Approach to Web Usability, Steve Krug spells out an approach to usability testing that anyone can easily apply to their own web site, application, or other product. (As he said in Don't Make Me Think, "It's not rocket surgery".)In this new book, Steve explains how to: -Test any design, from a sketch on a napkin to a fully-functioning web site or application-Keep your focus on finding the most important problems (because no one has the time or resources to fix them all)-Fix the problems that you find, using his "The least you can do" approachBy pairing the process of testing and fixing products down to its essentials (A morning a month, that's all we ask ), Rocket Surgery makes it realistic for teams to test early and often, catching problems while it's still easy to fix them. Rocket Surgery Made Easy adds demonstration videos to the proven mix of clear writing, before-and-after examples, witty illustrations, and practical advice that made Don't Make Me Think so popular.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Pathophysiology Made Incredibly Easy!


Lippincott Williams & Wilkins - 1998
    Chapters cover cancer, infection, immune disorders, genetics, and disorders of each body system, highlighting pathophysiologic processes, resulting signs and symptoms, diagnostic test findings, and current treatments. Reader-friendly features include illustrations, checklists, and full-color miniguides illustrating the pathophysiology of specific disorders.This edition has new full-color miniguides on cancer pathophysiology and neuropathology. A new Focus on Genetics feature identifies gene-related discoveries and their implications for treatment or diagnosis. Review questions and answers follow current NCLEX-RN® requirements and alternate-format questions are included.

Sun Certified Programmer & Developer for Java 2 Study Guide (Exam 310-035 & 310-027)


Kathy Sierra - 2002
    More than 250 challenging practice questions have been completely revised to closely model the format, tone, topics, and difficulty of the real exam. An integrated study system based on proven pedagogy, exam coverage includes step-by-step exercises, special Exam Watch notes, On-the-Job elements, and Self Tests with in-depth answer explanations to help reinforce and teach practical skills.Praise for the author:"Finally A Java certification book that explains everything clearly. All you need to pass the exam is in this book."--Solveig Haugland, Technical Trainer and Former Sun Course Developer"Who better to write a Java study guide than Kathy Sierra, the reigning queen of Java instruction? Kathy Sierra has done it again--here is a study guide that almost guarantees you a certification "--James Cubeta, Systems Engineer, SGI"The thing I appreciate most about Kathy is her quest to make us all remember that we are teaching people and not just lecturing about Java. Her passion and desire for the highest quality education that meets the needs of the individual student is positively unparalleled at SunEd. Undoubtedly there are hundreds of students who have benefited from taking Kathy's classes."--Victor Peters, founder Next Step Education & Software Sun Certified Java Instructor"I want to thank Kathy for the EXCELLENT Study Guide. The book is well written, every concept is clearly explained using a real life example, and the book states what you specifically need to know for the exam. The way it's written, you feel that you're in a classroom and someone is actually teaching you the difficult concepts, but not in a dry, formal manner. The questions at the end of the chapters are also REALLY good, and I am sure they will help candidates pass the test. Watch out for this Wickedly Smart book."-Alfred Raouf, Web Solution Developer, Kemety.Net"The Sun Certification exam was certainly no walk in the park but Kathy's material allowed me to not only pass the exam, but Ace it "--Mary Whetsel, Sr. Technology Specialist, Application Strategy and Integration, The St. Paul Companies

More Than Just Coincidence


Julie Wassmer - 2010
    Little did Julie know how momentous this meeting was set to be. Twenty years earlier, when Julie was just 16, she had become pregnant. Worried how her parents would react, Julie had kept her pregnancy a secret right up until the day she gave birth. Ten days later, she'd been forced to make the hardest decision of her life: to give her baby up for adoption. As the years passed, Julie often wondered what had happened to her daughter. Now, through the most extra-ordinary of coincidences, Julie was about to find out. A temporary secretary called Sara had just started working in the agents' office. Sara had recently discovered that she had been adopted, and had just got hold of her birth certificate. According to the certificate, her mother's name was Julie Wassmer.

The Way to Go: A Thorough Introduction to the Go Programming Language


Ivo Balbaert - 2012
    "

Heads-Up No-Limit Hold 'em: Expert Advice for Winning Heads-Up Poker Matches


Collin Moshman - 2008
    Yet, most hold em players who transition to the heads-up form, especially if they are from full ring no-limit games, do not succeed. Adjusting to the amount of aggression can be difficult since heads-up battles require you to bet and raise with many more hands than what would be considered standard at a full table. Despite this, no-limit heads-up hold em is growing rapidly, especially on the Internet. So mastering this form of poker can be invaluable for those seeking to add a winning loose-aggressive component to their game. In addition, with the increasing number of heads-up matches now available, becoming proficient in them can be highly profitable. This text, written by expert heads-up player Collin Moshman, is the first poker strategy book devoted exclusively to no-limit heads-up play. Through extensive hand examples and accompanying theory, you will learn to: 1. Master expected value, equity, value betting, and the fundamental mathematics of heads-up strategy, 2. Play and exploit each of the most common playing styles, 3. Manipulate the pot size based on your hand and your opponent, 4. Attack button limps, bluff multiple streets, and aggress in the most profitable manner, 5. Distinguish between optimal cash and tournament strategies, 6. Exploit your opponents tendencies and perceptions through metagame mastery, and 7. Maximize your heads-up profits through game theory and fundamental business concepts. So whether you are an aspiring heads-up professional, or want to be ready for the next time you re challenged to a one-on-one battle, Heads Up No-Limit Hold em provides you with the tools you need to succeed.

How to Architect


Doug Patt - 2012
    Changing the function of a word, or a room, can produce surprise and meaning. In How to Architect, Patt--an architect and the creator of a series of wildly popular online videos about architecture--presents the basics of architecture in A-Z form, starting with A is for Asymmetry (as seen in Chartres Cathedral and Frank Gehry), detouring through N is for Narrative, and ending with Z is for Zeal (a quality that successful architects tend to have, even in fiction--see The Fountainhead's architect-hero Howard Roark.)How to Architect is a book to guide you on the road to architecture. If you are just starting on that journey or thinking about becoming an architect, it is a place to begin. If you are already an architect and want to remind yourself of what drew you to the profession, it is a book of affirmation. And if you are just curious about what goes into the design and construction of buildings, this book tells you how architects think. Patt introduces each entry with a hand-drawn letter, and accompanies the text with illustrations that illuminate the concept discussed: a fallen Humpty Dumpty illustrates the perils of fragile egos; photographs of an X-Acto knife and other hand tools remind us of architecture's nondigital origins.How to Architect offers encouragement to aspiring architects but also mounts a defense of architecture as a profession--by calling out a defiant verb: architect!

Game Development Essentials: An Introduction


Jeannie Novak - 2004
    This book not only examines content creation and the concepts behind development, but it also give readers a background on the evolution of game development and how it has become what it is today. GAME DEVELOPMENT ESSENTIALS also includes chapters on project management, development team roles and responsibilities, development cycle, marketing, maintenance, and the future of game development. With the same engaging writing style and examples that made the first two editions so popular, this new edition features all the latest games and game technology. Coverage of new game-related technology, development techniques, and the latest research in the field make this an invaluable resource for anyone entering the exciting, competitive, ever-changing world of game development.

Introduction to Materials Management


J.R. Tony Arnold - 1991
    This is the only text listed in the APICS-The Educational Society for Resource Management CPIM Exam Content Manual as the text reference for the Basics of Supply Chain Management (BSCM) CPIM certification examination. Written in a simple and user-friendly style, it covers all the basics of supply chain management and production and inventory control.

AWS Certified Solutions Architect Official Study Guide: Associate Exam


Joe Baron - 2016
     AWS has been the frontrunner in cloud computing products and services, and the AWS Certified Solutions Architect Official Study Guide for the Associate exam will get you fully prepared through expert content, and real-world knowledge, key exam essentials, chapter review questions, access to Sybex’s interactive online learning environment, and much more. This official study guide, written by AWS experts, covers exam concepts, and provides key review on exam topics, including: Mapping Multi-Tier Architectures to AWS Services, such as web/app servers, firewalls, caches and load balancers Understanding managed RDBMS through AWS RDS (MySQL, Oracle, SQL Server, Postgres, Aurora) Understanding Loose Coupling and Stateless Systems Comparing Different Consistency Models in AWS Services Understanding how AWS CloudFront can make your application more cost efficient, faster and secure Implementing Route tables, Access Control Lists, Firewalls, NAT, and DNS Applying AWS Security Features along with traditional Information and Application Security Using Compute, Networking, Storage, and Database AWS services Architecting Large Scale Distributed Systems Understanding of Elasticity and Scalability Concepts Understanding of Network Technologies Relating to AWS Deploying and Managing Services with tools such as CloudFormation, OpsWorks and Elastic Beanstalk. Learn from the AWS subject-matter experts, review with proven study tools, and apply real-world scenarios. If you are looking to take the AWS Certified Solutions Architect Associate exam, this guide is what you need for comprehensive content and robust study tools that will help you gain the edge on exam day and throughout your career.

Fundamentals of Computer Graphics


Peter Shirley - 2002
    It presents the mathematical foundations of computer graphics with a focus on geometric intuition, allowing the programmer to understand and apply those foundations to the development of efficient code. - The fundamental mathematics used in graphics programs - The basics of the graphics pipeline - BSP trees - Ray tracing - Surface shading - Texture mapping Advanced topics include: - Curves and surfaces - Color science - Global illumination - Reflection models - Image-based rendering - Visualization Extensive exercises and references for further reading enhance each chapter. An introduction for novices---a refresher for professionals.

Anatomy of a Secret Life: The Psychology of Living a Lie


Gail Saltz - 2006
    But we can never know for certain, because what really goes on inside another’s head and heart is essentially a secret. How do you know if that secret is something that will hurt you? Your husband turns to face you in bed. Is he thinking about you or your closest friend? Your boss shows up in another new outfit. Did she get a raise or is she a compulsive shopper who is stealing money from the company? Your teenaged daughter is upstairs in her bedroom. Is she doing her homework or chatting online with a man twice her age? Anatomy of A Secret Life will take you inside the minds of secret-keepers and show you how secrets start, how they’re kept, and how they exact their devastating emotional and social toll. Using contemporary case studies and historical examples, Dr. Gail Saltz shows you how to spot—through subtle behaviors and clues—and safely stop the potentially dangerous secrets that someone, even you, might be concealing from the world.