Introducing Windows Server 2012


Mitch Tulloch - 2012
    This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business.Based on beta software, this book provides the early, high-level information you need to begin preparing now for deployment and management. Topics include:Virtualization and cloud solutions Availability Provisioning and storage management Security and scalability Infrastructure options Server administration

Thinking in CSS


Aravind Shenoy - 2014
    Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.

The C# Player's Guide


R.B. Whitaker - 2012
    

Screen Queens


Lori Goldstein - 2019
    An acceptance rate of two percent. A dream internship for the winning team. ValleyStart is the most prestigious high school tech incubator competition in the country. Lucy Katz, Maddie Li, and Delia Meyer have secured their spots. And they've come to win.Meet the Screen Queens.Lucy Katz was born and raised in Palo Alto, so tech, well, it runs in her blood. A social butterfly and CEO in-the-making, Lucy is ready to win and party.East Coast designer, Maddie Li left her home and small business behind for a summer at ValleyStart. Maddie thinks she's only there to bolster her graphic design portfolio, not to make friends.Delia Meyer taught herself how to code on a hand-me-down computer in her tiny Midwestern town. Now, it's time for the big leagues--ValleyStart--but super shy Delia isn't sure if she can hack it (pun intended).When the competition kicks off, Lucy, Maddie, and Delia realize just how challenging the next five weeks will be. As if there wasn't enough pressure already, the girls learn that they would be the only all-female team to win ever. Add in one first love, a two-faced mentor, and an ex-boyfriend turned nemesis and things get...complicated.Filled with humor, heart, and a whole lot of girl power, Screen Queens is perfect for fans of Morgan Matson, Jenny Han, and The Bold Type.

iPad: The Missing Manual


J.D. Biersdorfer - 2010
    That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.

The Problem with Software: Why Smart Engineers Write Bad Code


Adam Barr - 2018
    As the size and complexity of commercial software have grown, the gap between academic computer science and industry has widened. It's an open secret that there is little engineering in software engineering, which continues to rely not on codified scientific knowledge but on intuition and experience.Barr, who worked as a programmer for more than twenty years, describes how the industry has evolved, from the era of mainframes and Fortran to today's embrace of the cloud. He explains bugs and why software has so many of them, and why today's interconnected computers offer fertile ground for viruses and worms. The difference between good and bad software can be a single line of code, and Barr includes code to illustrate the consequences of seemingly inconsequential choices by programmers. Looking to the future, Barr writes that the best prospect for improving software engineering is the move to the cloud. When software is a service and not a product, companies will have more incentive to make it good rather than "good enough to ship."

Spring Boot in Action


Craig Walls - 2015
    In it, you’ll learn how to bypass configuration steps so you can focus on your application’s behavior. Spring expert Craig Walls uses interesting and practical examples to teach you both how to use the default settings effectively and how to override and customize Spring Boot for your unique environment. Along the way, you’ll pick up insights from Craig’s years of Spring development experience.

Are You Smart Enough to Work at Google?


William Poundstone - 2012
    The blades start moving in 60 seconds. What do you do? If you want to work at Google, or any of America's best companies, you need to have an answer to this and other puzzling questions. Are You Smart Enough to Work at Google? guides readers through the surprising solutions to dozens of the most challenging interview questions. The book covers the importance of creative thinking, ways to get a leg up on the competition, what your Facebook page says about you, and much more. Are You Smart Enough to Work at Google? is a must-read for anyone who wants to succeed in today's job market.

Counting from Zero


Alan B. Johnston - 2011
    I could not wait to find out what happened next." - Vint Cerf, Internet pioneer "The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters." - Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption program Today, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as 'zero day' attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner's knowledge, have become slave computers - remotely controlled 'zombies'. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks. Internet security expert Mick O'Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life. Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick's attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness? Unfolding across three continents, the new techno thriller "Counting from Zero" gives a realistic insider's view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.

Alexa: 1001 Tips and Tricks How To Use Your Amazon Alexa devices


Alexa Adams - 2017
    From shopping, to even getting information on flight times, to even tracking when to walk your dog, Alexa can do this. With over 23,000 skills and more being developed each day, Alexa is here to stay and is here to help you. But what can you do with Alexa? What are some of the abilities of Alexa that you can engage in, some that you can use to truly benefit yourself and others? Well, you’re about to find out. Here is a preview of what you'll learn: All of the different Echo devices and what they entail Various tips on how to use them all Tips to use the various features, including shopping Troubleshooting tips in order to have the best Amazon Echo experience Why you might consider getting one over another The capabilities of Alexa, including a whole slew of various things you can inquire from Alexa A comprehensive list of 1001 things to do with Alexa, including valuable tips and tricks You can become the Echo master that you know you can be, and this book is just the beginning of it all. With this, you’ll be able to control your Echo in the way that it’s meant to be, in the ways that you want it to be, and the different natures of this. Become the person that you want to be today, and make sure that you learn about your Echo, since you truly won’t regret it the moment you begin to use it, and you’ll master it even more with every interaction.

Free Books for Your Kindle


Bufo Calvin - 2008
    Please order that book instead to get a better value.This simple guide will show you how to get hundreds of free books for your Kindle! NOTE: This title does not actually contain the free books, but will help you find them. NOTE: There is a revised version of this title available.

Amazon Echo: Master Your Amazon Echo; User Guide and Manual (Amazon Echo Updated 2017 User Guide)


Andrew McKinnon - 2015
    This revolutionary device: Is Easy to Access Has Excellent Voice Quality Provides Superior Voice Recognition Handles Many Privacy Concerns Has Frequent Software Upgrades Offers Natural-Sounding Voices Allows for Cloud Processing Has Solid, Dependable Hardware What can this book do for you? Amazon Echo: Master Your Amazon Echo; User Guide and Manual teaches you how to use Alexa, how this feature is designed, and how to set it up. You'll learn about: The Body The Blue Light How to Use the Microphones Using Sensors Remote Control Functions Essential Setup Tips You'll find out how to Navigate the Echo and its App, Use the Echo Pen, and Activate your Echo with Voice Command and the remote control. You'll learn to use Bluetooth and connect other home devices to your Echo - including music services! Let Amazon Echo: Master Your Amazon Echo; User Guide and Manual take you by the hand and turn you into an Amazon Echo expert! Download your copy TODAY!

Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)


James Smith - 2016
    Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!

The Complete Free Kindle Fire Apps (Free Kindle Fire Apps That Don't Suck Book 1)


The App Bible - 2012
    This is the one you want… Personally, I will check out any book this author writes about apps because, for some reason, maybe a bad case of OCD, he is obviously compelled to do the most thorough investigation into each and every aspect, good and bad of apps in a particular genre. My hat's off to him, and he has my thanks for saving me a ton of time and grief.” - Linda Abbott (Reviewer) Nearly 800 Pages of In-Depth Reviews, and Tips and Tricks to Help You Get The Most Out of Your Free Kindle Fire Apps Question: Why Do You Need This Book? Answer: Because you have better things to do with your time than to trudge through the Amazon App Store and test tons of apps until you find the best ones Question: OK. But Why Do You Need To Buy THIS Book? Answer: Because you need more than some random list of “Top Kindle Fire Apps.” You also need: To know which apps to download first Tips and tricks for how to get the most out of the apps How to find help if you’re having a problem with an app An in-depth review describing what is good and what is bad about each app Problem: Even if you have a list of the top free apps, how do you know which ones to install first? Solution: At the end of this book, all the apps are ranked from best to worst according to a UNIQUE RANKING SYSTEM FOUND ONLY IN MY BOOKS Question: How Else Is This Book Unique? Answer: In addition to its unique ranking system, it also offers in-depth reviews that provide the following: A summary of what the app does A summary of what is good and what is bad about each app When available: The app developer’s contact information, website information, as well as links to pertinent articles about the app Tips and tricks for many of the apps (how to get the most from the app) A brief summary of the positive and negative reviews of the app on Amazon PLUS: A list of 5 must-have free productivity apps that every Kindle Fire owner should install to have greater control over their Kindle Fire A list of 15 free productivity apps that most Kindle Fire owners will find useful since they provide a great deal of functionality Question: OK…But What Types Of Apps, Exactly, Does The Book Include? Answer: A dizzying variety… Game Apps Arcade and Board game apps Mind game apps: Card, logic, and word game apps Kids Apps Educational apps and Game apps for kids: Apps for toddlers, preschoolers, elementary schoolers, and high schoolers in the following categories: Art apps, Book apps, English apps, and Math apps Productivity Apps Art

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.