Book picks similar to
High Performance Switches and Routers by H. Jonathan Chao


pimpin-aint-easy-but-computers-are
technical-books
textbooks
tsundoku-nonfiction

Night of the Hunter


Rick Jones - 2016
    When he returns stateside to begin life anew, he quickly finds himself caught up in a scandal involving the appropriation of documents for an undetectable state-of-the-art ICBM by the Islamic State. But what if Jon Jericho discovers something different? What if he learns that the plans were appropriated by American and Israeli intelligence, and then proffered to the Islamic State? As Jericho digs deeper he quickly draws the attention of certain CIA principals. So when a CIA paramilitary group gives chase to terminate Jericho with extreme prejudice to keep the conspiracy safe, the Hunter must utilize his special skill set not only to survive, but to bring forward the hidden truth before the world erupts into global war.

Summary and Analysis of The Handmaid's Tale: Based on the Book by Margaret Atwood (Smart Summaries)


Worth Books - 2017
    Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader.    This short summary and analysis of The Handmaid’s Tale by Margaret Atwood includes:   Historical context Part-by-part summaries Analysis of the main characters Themes and symbols Important quotes Fascinating trivia Glossary of terms Supporting material to enhance your understanding of the original work   About Margaret Atwood’s The Handmaid’s Tale:   Margaret Atwood’s dystopian literary masterpiece tells the story of Offred, a Handmaid living in the near future in what was once the United States. A new theocratic regime called the Republic of Gilead has come to power and changed life as she knew it.   Once Offred had a her own name and a loving family—a husband and daughter—both of which were taken from her; now she belongs to the Commander and his hostile wife, and her only value lies in her ability to bear a child for them. She used to read books and learn; now such things are forbidden to all women.   Gripping, disturbing, and so relevant today, The Handmaid’s Tale is a brilliant novel and a chilling warning about what can happen when extreme ideas are taken to their logical conclusions.   The summary and analysis in this ebook are intended to complement your reading experience and bring you closer to a great work of fiction.

Think Bayes


Allen B. Downey - 2012
    

The Swift Programming Language


Apple Inc. - 2014
    Swift builds on the best of C and Objective-C, without the constraints of C compatibility. Swift adopts safe programming patterns and adds modern features to make programming easier, more flexible, and more fun. Swift’s clean slate, backed by the mature and much-loved Cocoa and Cocoa Touch frameworks, is an opportunity to reimagine how software development works.

Money & Capital Markets


Peter S. Rose - 1989
    This book discuses various major types of financial institutions and financial instruments present along with how and why the system of money and capital markets is changing. It also provides a descriptive explanation of how interest rates and security values are determined.

Family Nurse Practitioner Certification Intensive Review: Fast Facts and Practice Questions


Maria T. Codina Leik - 2007
    Using test-taking strategies meticulously developed by the author, the Review provides unique question dissection techniques, targeted key content review, 600 in-depth practice questions, and detailed, current exam information in a fast facts style. This second edition includes new chapters on pediatrics and adolescence and an extensive new section on geriatrics that encompasses body/metabolic changes, common disorders, and hospice/ethical considerations. The book also presents an expanded, intensive pharmacology review, 100 new exam questions, and is the only review to offer a new research chapter providing elements of research needed for E-B practice.The book reviews the complete lifespan from pediatrics to geriatrics and including pregnancy, and covers non-clinical content including ethics, medico-legal issues, advanced practice law, and reimbursement guidelines. The review of primary care disorders is organized by body system. The content is applicable for certification exams for both the ANCC and the AANP. This book is also a great companion to the FNP Certification Review app, coming soon for your iPhone or iPad!New to this edition: Reorganized for greater ease of useProvides extensive new section on geriatricsContains expanded coverage of pediatrics and adolescenceOffers expanded intensive-style pharmacology reviewPresents elements of research needed for E-B practiceIncludes 100 new questions for a title of 600 high-yield questionsWhy use this review?Delineates strategic question dissection techniques for study success developed by the author, a leading provider of exam preparation education for over 20 yearsProvides precisely targeted content reviewOffers 600 in-depth practice questions and detailed exam informationIncludes Exam Tips and Clinical Tips to help prioritize test content.It is the only book to present elements of research needed for E-B practiceOutlines normal findings and benign variants in physical assessment of each body systemIncludes succinct review of diseases commonly seen in primary careIt's a great companion to the forthcoming FNP Certification Review app!

Bittersweet: A short story collection plus extract of new novel Christmas at the Beach Hut


Veronica Henry - 2018
    From forgotten loves to second chances, new happiness and old friends, this is an uplifting and moving collection of short stories about how love changes, and how it changes us - from Sunday Times bestseller Veronica Henry. Your favourite authors love Veronica's gorgeous storytelling: 'Fills your heart with joy and leaves you with a big fat smile on your face' Milly Johnson on Christmas at the Beach Hut 'Truly blissful escapism' Lucy Diamond on A Family Recipe 'A delight from start to finish' Jill Mansell on The Forever House - - - - - ** This is a collection of short stories **

Scar Tissue


David Skivington - 2013
    Transported to a dingy basement in Kolkata to identify the body of her murdered husband she has no explanation for his presence in India. As she searches for answers about who the man she married really was she finds his death surrounded by allegations of drug smuggling, child trafficking and murder. Unsure of what is true and who she can trust, Rachel has no idea of the danger her husband's hidden life has put her in.

Paul Wilmott Introduces Quantitative Finance (The Wiley Finance Series)


Paul Wilmott - 2001
    Adapted from the comprehensive, even epic, works Derivatives and Paul Wilmott on Quantitative Finance, Second Edition, it includes carefully selected chapters to give the student a thorough understanding of futures, options and numerical methods. Software is included to help visualize the most important ideas and to show how techniques are implemented in practice. There are comprehensive end-of-chapter exercises to test students on their understanding.

Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell


Lee Holmes - 2007
    Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem

CLR via C# (Pro-Developer)


Jeffrey Richter - 2006
    This guide is suitable for developers building various kinds of application - including Microsoft[registered] ASP.NET, Windows[registered] Forms, Microsoft[registered] SQL Server[registered], Web services, and console applications.

617 Squadron: The Dambusters at War (Memoirs from World War Two)


Tom Bennett - 1986
    

Handbook of Applied Cryptography


Alfred J. Menezes - 1996
    Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions


Johnny Cache - 2007
    Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.

Human Resource Management


R. Wayne Mondy - 1990
    It reflects the latest information (in 2001), including the impact of global competition and rapid technological advances, that have accelerated trends such as shared service centres, outsourcing and just-in-time training. A number of actual company examples demonstrates how concepts are being used in several leading-edge organizations.