Book picks similar to
High Performance Switches and Routers by H. Jonathan Chao


tsundoku-nonfiction
might-read
networking
pimpin-aint-easy-but-computers-are

Mr and Mrs Sullivan: Standalone Arranged Marriage Romance


Simone Nicholls - 2020
    

Bring the Joy


Jessica Janzen - 2020
    From the bliss of her dramatic, romantic saga with her now husband, to the trials and triumph of her career journey as a young women, to the devastating loss of her son when he was only six months old, Jessica's commitment to follow the nudges of her heart have seen her through every season. Through her hilarious, inspiring stories and refreshing honesty, Jessica will challenge you start looking for ways to brings more joy to your life and the lives of those around you. Life lived to the fullest can only happen when you bring the joy.

CompTIA Project+ Study Guide Authorized Courseware: Exam PK0–003


Kim Heldman - 2010
    You'll find complete coverage of all exam objectives, including key topics such as project planning, execution, delivery, closure, and others. CompTIA's Project+ is the foundation-level professional exam in the complex world of project management; certified project managers often choose to go on and obtain their Project Management Professional (PMP) certifications as well Provides complete coverage of all exam objectives for CompTIA's first update to the Project+ exam in six years Covers project planning, execution, delivery, change, control, communication, and closure Demonstrates and reinforces exam preparation with practical examples and real-word scenarios Includes a CD with Sybex test engine, practice exams, electronic flashcards, and a PDF of the book Approach the new Project+ exam with confidence with this in-depth study guide! Reviews

The Dressmaker's Son


Abbi Sherman Schaefer - 2013
    Rachael's family comes to America to start a new life after fleeing the pogroms in Russia. Rebekah comes to America with her son, Samuel, fleeing his father, Misha, a Russian soldier with whom she had an affair and has threatened to take him away from her so he will not grow up as a Jew and the son of a cobbler. Set in the Lower East Side of New York and pre-revolutionary St. Petersburg, Russia, both women adjust to life in America until Misha kidnaps Samuel and returns with him to Russia. How Rebekah rises to the challenge of earning enough money as a designer of women's gowns to return to St. Petersburg to find her son, and the difficulties she encounters while there, including murder and prison, show the reader the full extent of a mother's ingenuity and determination when it comes to her child. Rachael also faces the possibility of losing a child to war when her son Solomon enlists in the army as America's entry into World War I approaches.

MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment


Dan Holme - 2003
    As you d expect, there s accurate, clearly written coverage of every exam objective (now including Service Pack 1): installation and configuration; user, group, and computer accounts; filesystems and backup/recovery; hardware, disk storage, and printers; Update Services and licensing; monitoring, and more. The content s been extensively revamped and more effectively focused on the exam s objectives. There s also a large Prepare for the Test section packed with questions, answers, testing skills, and suggested practices. You ll find more case studies, more troubleshooting scenarios, electronic practice testing in practically any form your heart desires, and (if you don t have Windows Server handy) a 120-day evaluation version. There s even a 15% discount coupon for your exam -- making this package an even more compelling proposition. Bill Camarda, from the June 2006 href="http://www.barnesandnoble.com/newslet... Only

Netter's Concise Orthopaedic Anatomy


Jon C. Thompson - 2001
    Jon C. Thompson presents the latest data in thoroughly updated diagnostic and treatment algorithms for all conditions while preserving the popular at-a-glance table format from the previous edition. You'll get even more art from the Netter Collection as well as new radiologic images that visually demonstrate the key clinical correlations and applications of anatomical imaging. For a fast, memorable review of orthopaedic anatomy, this is a must-have.Maintains the popular at-a-glance table format that makes finding essential information quick and convenient.Contains useful clinical information on disorders, trauma, history, physical exam, radiology, surgical approaches, and minor procedures in every chapter.Lists key information on bones, joints, muscles, and nerves in tables correlate to each Netter image.Highlights key material in different colors-pearls in green and warnings in red-for easy reference. Features both plain film and advanced radiographic (CT and MRI) images, along with cross-sectional anatomic plates for an even more thorough visual representation of the material.Includes additional common surgical approaches to give you a broader understanding of techniques.Incorporates reorganized Complicated Arthology tables for large joints, such as the shoulder, knee, and hip, for increased clarity and to incorporate new artwork and additional clinical correlations.Reflects new data and current diagnostic and treatment techniques through updates to the Disorders and Fractures sections and the Physical Exam and Anatomic tables in each chapter.Presents the very latest developments in the field through thoroughly updated diagnostic and treatment algorithms for all clinical conditions.

CCNA - Cisco Certified Network Associate Study Guide: Exam 640-802


Todd Lammle - 2007
    Completely Revised for the New 2007 Version of the CCNA Exam (#640-802) Cisco networking authority Todd Lammle has completely updated this new edition to cover all of the exam objectives for the latest version of the CCNA exam.

Power System Analysis and Design [With CDROM]


J. Duncan Glover - 2001
    Like earlier editions of the book, physical concepts are highlighted while also giving necessary attention to math-ematical techniques. Both theory and modeling are developed from simple beginnings so that they can be readily extended to new and complex situations. Beginning in Ch. 3, students are introduced to new concepts critical to analyzing power systems, including coverage of both balanced and unbalanced operating conditions. The authors incorporate new tools and material to aid students with design issues and reflect recent trends in the field. Each book now contains a CD with Power World software. This package is commonly used in industry and will enable students to analyze and simulate power systems. The authors use the software to extend, rather than replace, the fully worked examples provided in previous editions. In the new edition, each Power World Simulator example includes a fully worked hand solution of the problem along with a Power World Simulator case (except when the problem size makes it impractical). The new edition also contains updated case studies on recent trends in the Power Systems field, including coverage of deregulation, increased power demand, economics, and alternative sources of energy. These case studies are derived from real life situations.

First Seal Unlocked


M.Q. Kajack
    But from the ruins of civilization, humanity creates new technologies and unlocks hidden, latent potential within themselves, and through the sacrifices of heroes from around the globe, somehow manages to survive. But dangers lurk within the depths of the oceans, growing stronger. Humanity has caught a moment of reprieve, but must continue to evolve in order to stay alive. Mu Feng, born mute and weak to a retired battle specialist, may just be the least likely candidate to become the next savior of humanity. Enjoy this great Xianxia/Wuxia Cultivation novel. Myriad Stars is an universe filled with cultivators and a great deal of LitRPG/GameLit stuff.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

No Safe Place


Emily Christie - 2009
    Emily Christie grew up surrounded by relatives whose job it was to protect her. Her father was a hard-working policeman, her grandad was a respected paramedic; they were the perfect family. Or so it seemed. Evil lurked beneath the surface. When she was just five years old, Emily’s beloved grandad started grooming her, calling her his ‘special little girl’. In the years that followed she was subjected to countless unforgivable acts of sexual abuse at his hands, that escalated in severity and threatened to tear her life apart. Knowing her grandad was considered to be a pillar of the community, Emily was too scared to tell the truth. But one day she found the courage to stop the abuse and the strength to start rebuilding her life. No Safe Place is the inspirational story of a little girl’s journey from helpless victim to triumphant survivor.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

The C# Player's Guide


R.B. Whitaker - 2012
    

Pashtun


Ron Lealos - 2010
    The job falls to a man they have named Frank Morgan—an agent who stood out as a recruit at Quantico and whose skills resemble those of the legendary Vietnam assassin. The other soldiers claim Frank’s abilities as a sniper and a tracker border on the supernatural and are more than willing to complete this mission with him.Frank begins his adventure in Afghanistan with another Company-appointed soldier: an indestructible lyrical Irishman with a cutting sense of humor and a bottle of Jameson never far from hand. After the men rescue a burqa-clad young woman, they soon discover that the Company has not been honest with them and decide to take a second mate under their wing—a giant who quotes poetry and rap songs while he both enacts torture and lives through his own agonizing trials.They know now that oil, drugs, and greed have led to this quest; assassinating the terrorists is not their main objective. However, this still must be done. After becoming dangerously acquainted with the heroin business in the frontier provinces, Frank and his comrades continue their mission. But the lines have now blurred, and the assignment is more complicated than they expected.Skyhorse Publishing, as well as our Arcade, Yucca, and Good Books imprints, are proud to publish a broad range of books for readers interested in fiction—novels, novellas, political and medical thrillers, comedy, satire, historical fiction, romance, erotic and love stories, mystery, classic literature, folklore and mythology, literary classics including Shakespeare, Dumas, Wilde, Cather, and much more. While not every title we publish becomes a New York Times bestseller or a national bestseller, we are committed to books on subjects that are sometimes overlooked and to authors whose work might not otherwise find a home.

McGraw-Hill's GED: The Most Complete and Reliable Study Program for the GED Tests


Patricia Mulcrone - 2001
    It offers targeted assessment, easy-to-follow instruction, hundreds of reinforcement activities, and simulated GED tests for all five GED subject areas: Test 1 Language Arts, Writing; Test 2 Social Studies; Test 3 Science; Test 4 Language Arts, Reading; Test 5 Mathematics. A half-length Pretest for each subject helps pinpoint strengths and weaknesses for targeting study. Clear instruction, followed by hundred of practice questions in official GED format help to build confidence. A Posttest for each subject is followed by a second Practice Test in official GED format to determine readiness for the actual test.