- Table View
- List View
Ten stories of mystery and imagination in a world that cannot be--including the never-before-published "I Had No Head and My Eyes Were Floating Way Up in the Air," originally written for Harlan Ellison's The Last Dangerous Visions (tm) People work. Folk play. That is the way it has been in this country as long as Sam can remember. He is happy, and he understands that this is the way it should be. People are bigger than folk. They are stronger. They do not need food or water. They do not need the warmth of a fire. All they need is a job to do and a blacksmith to fix them when they break. The people work so the folk can drink their moonshine, fish a little, throw a horseshoe. But when Sam starts to wonder about why the world is this way, his life will never be the same. Along with the other stories in this collection, "I Am Crying All Inside" is a compact marvel: a picture of an impossible reality that is not so different from our own. Each story includes an introduction by David W. Wixon, literary executor of the Clifford D. Simak estate and editor of this ebook.
Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 About This Book * Understand the basics of wireless penetration testing and its importance * Learn the techniques to perform penetration testing on your wireless networks, such as scanning, detecting vulnerabilities in your victim, and then attacking * This simple and intriguing guide takes a step-by-step approach that will help you get to grips with network pentesting using just your Android device and zANTI2 Who This Book Is For The book is intended for those who want to know more about network penetration tests and have no prior experience, as well as for those who are experienced in network systems and are curious to discover more about this topic. Since zANTI2 features an extremely intuitive and easy to control interface, it doesn't require any special skills. What You Will Learn * Understand the importance of penetration testing throughout systems * Take a run through zANTI2's interface and understand the requirements to the app * Perform advanced scanning/network mapping and discover the various types of scans used on a target * Discover and remotely connect to open ports on a target, thereby accessing a target's files and folders remotely * Detect vulnerabilities on a target, learn how to remotely exploit them, and discover ways to protect your self from these exploits * Understand what an MITM attack is and how it works, and apply this knowledge to perform attacks on network targets * Learn to hijack sessions, identify victim's passwords, replace images on websites, inject scripts, and more * Use this knowledge to protect yourself from all of the attacks you will study In Detail A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed, can be exploited by an unwanted entity. This book starts off with an introduction to what penetration testing is, and how it can be performed on Android using zANTI2. Once you are aware of the basics, we move on to teach you the different types of scans that can be performed to search for targets. You will then learn how to connect to open ports and intrude into an unsecured computer. From here you will explore vulnerabilities and their usage, including ShellShock and SSL Poodle vulnerability. When connected to an open network, a user is susceptible to password and session hijacking, and a number of other cyber attacks. The book therefore ends with one of the main aspects of cyber security: the Man in the Middle attack. You will get to know everything about the MITM attack, how it works, and how one can be protected against it. Style and approach The book follows a step-by-step approach with each of the parts explained in an easy-to-follow style. Most of the methods showcased can be tried out immediately on almost any network.
Troubleshoot your Puppet infrastructure to leverage your system's performance effectively About This Book * Covers major tools in Puppet deployment * Fix catalog compilation problems and deal with issues found in larger deployments, such as scaling and improving performance. * A fast-paced guide with real-world examples Who This Book Is For If you are a beginner to intermediate Puppet Engineer looking for guidance to help fix problems with your Puppet deployments, this book is for you. What You Will Learn * Debug your Puppet infrastructure * Use APIs to ensure services are working properly * Fix catalog compilation issues * Solve problems using Hiera tool * Detect problems in your environment using PuppetDB tool * Learn ways to format code to aid in identifying errors * Troubleshoot errors in modules and templates In Detail Puppet is a configuration management system written for system administrators to manage a large number of systems efficiently and help maintain order. Deploying Puppet becomes more complex as you increase the number of nodes in your environment. The Puppet tool is an intelligent solution that increases the automation footprint for the proactive management of server infrastructures. Puppet's simple programming language is usable on most operating systems and is portable on different deployment environments. We begin by looking at the puppet.conf server configuration file, and talk about possible problems that can occur. What does puppet really do in the background and what options does it provide for troubleshooting? This is what we will explore. Moving on, we will be troubleshooting errors made in modules and templates, finding the best solutions. We will be writing code that will helping us in identify errors. Then we will explain how several ENCs do their job and how puppet communicates with them. We will learn how PuppetDB collects data generated by Puppet. It also enables advanced Puppet features like exported resources, and can be the foundation for other applications that use Puppet's data. By the end of the book we will have learned the best debugging tips for Puppet and PuppetServer. Style and approach This is a quick-paced guide packed with real-world examples and solutions to obstacles in your Puppet infrastructure.
Explore the world of data science through Python and learn how to make sense of data About This Book * Master data science methods using Python and its libraries * Create data visualizations and mine for patterns * Advanced techniques for the four fundamentals of Data Science with Python - data mining, data analysis, data visualization, and machine learning Who This Book Is For If you are a Python developer who wants to master the world of data science then this book is for you. Some knowledge of data science is assumed. What You Will Learn * Manage data and perform linear algebra in Python * Derive inferences from the analysis by performing inferential statistics * Solve data science problems in Python * Create high-end visualizations using Python * Evaluate and apply the linear regression technique to estimate the relationships among variables. * Build recommendation engines with the various collaborative filtering algorithms * Apply the ensemble methods to improve your predictions * Work with big data technologies to handle data at scale In Detail Data science is a relatively new knowledge domain which is used by various organizations to make data driven decisions. Data scientists have to wear various hats to work with data and to derive value from it. The Python programming language, beyond having conquered the scientific community in the last decade, is now an indispensable tool for the data science practitioner and a must-know tool for every aspiring data scientist. Using Python will offer you a fast, reliable, cross-platform, and mature environment for data analysis, machine learning, and algorithmic problem solving. This comprehensive guide helps you move beyond the hype and transcend the theory by providing you with a hands-on, advanced study of data science. Beginning with the essentials of Python in data science, you will learn to manage data and perform linear algebra in Python. You will move on to deriving inferences from the analysis by performing inferential statistics, and mining data to reveal hidden patterns and trends. You will use the matplot library to create high-end visualizations in Python and uncover the fundamentals of machine learning. Next, you will apply the linear regression technique and also learn to apply the logistic regression technique to your applications, before creating recommendation engines with various collaborative filtering algorithms and improving your predictions by applying the ensemble methods. Finally, you will perform K-means clustering, along with an analysis of unstructured data with different text mining techniques and leveraging the power of Python in big data analytics. Style and approach This book is an easy-to-follow, comprehensive guide on data science using Python. The topics covered in the book can all be used in real world scenarios.
Build intelligent software stacks with the Puppet configuration management suite About This Book * Develop high-quality Puppet modules in an isolated development environment * Manage complex development environments with industry-leading configuration management tool * A comprehensive guide to get you started with Puppet development and deployment in virtual environments Who This Book Is For If you are new to configuration management and IT automation processes and are looking for better ways to manage system configuration changes at scale, this book is for you. Basic knowledge of Linux System Administration is a prerequisite. What You Will Learn * Manage your system with Puppet instantly * Develop Puppet in an isolated development environment * Make your manifests reusable to avoid re-inventing the wheel * Automate monitoring to improve the user experience through increased uptime * Enable nodes to communicate with each other via Puppet Master * Make environment configuration dynamic using stored configurations and PuppetDB * Extend Puppet beyond the built-in functionalities * Manage your environment through the Puppet Enterprise console In Detail Puppet is a cross-platform, open source configuration management utility, which runs on various Unix, Linux, and Windows Microsoft platforms. It allows you to automate all your IT configurations, giving you control of what you do to each node, and also when and how you do it. You'll be able to build and manage development, test, and production environments independently without requiring previous system administration experience. Learning Puppet is a step-by-step guide on how to get started with Puppet development and use Puppet modules as the building blocks to deploy production-ready application cluster in virtual environment. You will begin with the installation of development environment on the VirtualBox hypervisor and Puppet Learning VM that will be used as the platform for testing and development of Puppet modules. Next, you will learn how to manage virtual machines and snapshots effectively and enhance the development experience with advanced VirtualBox features. Later the book will focus on Puppet module development in detail. You will be guided through the process of utilizing existing modules that are available in the public module repository, write your own modules and use them to deploy a real-world web application that includes features such as monitoring and load balancing. You will then learn to scale your environment and turn your static configuration into a dynamic one through stored configurations and PuppetDB. Finally, the book will provide you with practical advice on Puppet troubleshooting and managing your environment with the wealth of features provided by the Puppet Enterprise console. Style and approach A comprehensive introductory guide to help you manage your infrastructure with Puppet. All instructions and explanations are supported with screenshots and code examples to ensure you get an easy start with Puppet.
Become proficient in building PLC solutions in Integrated Architecture from the ground up using RSLogix 5000 About This Book * Introduction to the Logix platform and Rockwell Automation terminology, with resources available online in the literature library * Build real-world Rockwell Automation solutions using ControlLogix, CompactLogix, SoftLogix, RSLogix 5000, and Studio 5000 * Understand the various controllers and form factors available in the ControlLogix and CompactLogix platforms, and the recent changes under the new Studio 5000 Automation Engineering and Design software suite Who This Book Is For This book is for PLC programmers, electricians, instrumentation techs, automation professionals with basic PLC programming knowledge, but no knowledge of RSLogix 5000. If you are a student who is familiar with automation and would like to learn about RSLogix 5000 with minimal investment of time, this is the book for you. What You Will Learn * Briefly explore the history of Rockwell Automation and the evolution of the Logix platform * Discover the complete range of ControlLogix and ComplactLogix controllers and form factors available today, and the key things you should consider when you are engineering a Rockwell Automation solution * Explore the key platform changes introduced with Studio 5000 and Logix Designer version 24 and the latest firmware versions * Get to grips with the modules available in the ControLogix, SoftLogix, and CompactLogix platforms * Understand writing Ladder Logic (LL) routines, Sequential Function Chart (SFC) routines, and Structured Text routines (ST) * Design Function Block Diagrams (FBD) and their easy integration with HMIs In Detail RSLogix 5000 and Studio 5000's Logix Designer are user-friendly interfaces used for programming the current generation of Rockwell Automation Controllers including ControlLogix, CompactLogix, and SoftLogix. When engineering automation solutions using Logix, it is important to study the changes to the platform introduced with Studio 5000 and the various controllers, modules, and form factors available today. RSLogix 5000 programming packages help you maximize performance, save project development time, and improve productivity. This book provides a detailed overview of the Logix platform including ControlLogix, CompactLogix, and SoftLogix and explains the significant changes introduced in Studio 5000. A clear understanding of the recent Logix platform changes is critical for anyone developing a Rockwell Automation solution. It provides an easy-to-follow, step-by-step approach to learning the essential Logix hardware and software components and provides beginners with a solid foundation in the Logix platform features and terminology. By the end of this book, you will have a clear understanding of the capabilities of the Logix platform and the ability to navigate the Rockwell Automation Literature Library Resources. Style and approach A step-by-step approach to RSLogix 5000, which is explained in an easy-to-follow style. Each topic is explained sequentially with detailed explanations of the basic and advanced features of Rockwell Automation that appeal to the needs of readers with a wide range of experience.
Harness the power of Microsoft Azure services to build efficient cloud solutions About This Book * Get to grips with the features of Microsoft Azure in terms of Blob, Table, Queue, and File storage * Learn the how and when of using the right storage service for different business use cases * Make use of Azure storage services in various languages with this fast-paced and easy-to-follow guide Who This Book Is For If you are an IT professional with basic knowledge of Microsoft Azure and want to learn Azure storage services, then this book is for you. Some familiarity with C# and Visual Studio is needed in order to utilize the examples present in the book. What You Will Learn * Get familiar with Windows Azure Storage Service in terms of architecture and working * Recognize the libraries and tools offered by Azure storage, supporting several popular programming languages * Know how the storage services expose their resources as REST APIs and what client libraries exists to develop against the storage * Gain the understanding of types of Blobs and best ways to upload and retrieve them * Learn how to make use of Tables as a NoSQL data store and how to retrieve, insert, update and delete entities in terms of design patterns * Use Queue storage as a messaging solution for communications between different apps * Create mounted shares and allow legacy systems to access data using the SMB protocol * Get accustomed to deal with faults, monitor storage metrics and logs In Detail With the many advantages of using cloud computing, Azure Storage is a robust platform that helps you shift faster to the cloud by providing scalable, durable and highly available data storage options. For developers, it provides a rapid development environment that supports building large-scale applications to support new scenarios on the cloud, server, mobile and web. For IT professionals, it reduces complexity of managing, protecting and replicating data. This book will make you familiar with the Azure storage in terms of architecture and components. It starts with the basics of storage accounts, which give access to the four basic services the Blob, Table, Queue, and File storage services. These services are exposed through a REST API that makes it possible for client libraries to implement most of their functionality in a wide range of popular programming languages. Emphasizing the Windows Azure Client Library for .NET, we will deal with storing and retrieving unstructured data with Blobs, then will move to Tables to insert and update entities in a structured NoSQL fashion. Then we will discover Queues as a reliable messaging service, and after that we will show File storage that allows you to migrate legacy applications data to the cloud to end with transient fault handling and service monitoring. Style and approach This book is a concise and fast-paced guide to learn about development for storage services. Each topic is elaborated sequentially, in order to create basic knowledge for using it in the right place and the correct way.
Perfect the art of creating CRYENGINE games through exciting, hands-on game development projects About This Book * Create CRYENGINE games from scratch with CRYENGINE Blank Game Starter-kit * Discover good working practices and tips to quickly jump into making a new level in the game * Build practical game projects and discover advanced concepts of CRYENGINE game development using the examples in the book Who This Book Is For This book is intended for CRYENGINE game developers, wanting to develop their skills with the help of industry experts. A good knowledge level and understanding of CRYENGINE is assumed, to allow efficient programming of core elements and applications. What You Will Learn * Create a CRYENGINE game from scratch with the Game Starter-kit * Add custom methods to allow the player/AI to use a weapon * Create complete "start" and "end" game menus using Scaleform and C++ * Discover how to use highpoly modeling workflow and techniques within the pipeline for the SDK to use * Use the Crytiff exporter from Photoshop * Export the CHR--the format the engine needs to read the skeleton * Integrate the character in the engine using the character tool * Better understand the rules to create and author skeletons to rig characters designed for CRYENGINE * Debug common setup issues that might appear during production with useful tools In Detail CRYENGINE is a game engine developed by Crytek for PC, Playstation, Xbox, Android, and iOS. It can be used to create AAA games, movies, high-quality simulations, and interactive applications. It is most popularly used for game development. In this book, you will start off by exploring the CRYENGINE "Blank" Game Starter-kit, creating a completely playable character from scratch and controlling its movement. You will learn how to implement a weapon and ammo class, and will create complete "start" and "end" game menus using Scaleform and C++. Additionally, you will learn some key texturing techniques for PBR and how to create and bake maps to the lowpoly model. You will also explore how to get a static model from Maya and shaders setbup in the SDK to check the textures during creation, and create all the necessary engine files to export and see the game character's animations in your engine. In the final third of the book, you will learn how to create objectives, set up saved games, layer on audio polish to help immerse the player in the experience, and debug game issues. Style and approach An easy-to-follow, practical guide covering three exciting projects. As you work through each project you will explore new topics including complex animation, advanced scripting, and complex character motion. All the code used in each project is explained in detail.
Over 60 hands-on recipes to perform server virtualization and manage virtualized server solutions with Proxmox About This Book * Learn the process of installing, configuring, and managing Proxmox clusters * Explore ways of integrating various storage systems with Proxmox * Step-by-step and easy-to-learn instructions to build virtual environments of any size using Proxmox Who This Book Is For This book is perfect for system administrators who want to learn to implement and administer Proxmox VE environments. Since this book will not cover the basics of Proxmox, a basic understanding of virtualization and networking with Proxmox VE is required. What You Will Learn * Install and configure an enterprise grade, cluster-based virtual environment using Proxmox * Manage a cluster with Graphical User Interface using datacenter, node, KVM, and OpenVZ menus among others * Learn different ways of configuring your network and clusters to create complex cloud services * Configure and manage the built-in Proxmox firewall to protect your virtual environment * Integrate storage systems such as Ceph, Sheepdog, and ZFS for virtual machine management to suit your business needs * Backup and restore your data via stop suspend, and snapshot modes * Upgrade a Proxmox node with new releases and apply update patches through GUI or CLI * Monitor the resources and virtual machines to maintain performance and uptime * Explore commands used for Proxmox and Ceph cluster through CLI In Detail Proxmox VE goes head to head with big virtualization platforms without bearing the overheads of high costs and vendor lock-ins. Rock solid stability and extremely easy manageability gives Proxmox VE an edge in the world of virtualization. The Proxmox cluster file system (pmxcfs) is designed uniquely for storage of configuration files with high security and reliability. Its simplicity and robustness make it easy for system administrators to manage their systems efficiently. Proxmox VE's intuitive interface, high availability, and unique central management system puts it on par with the world's best virtualization platforms. Its simplicity and high quality of service is what makes it the foremost choice for most system administrators. Starting with a step-by-step installation of Proxmox nodes along with an illustrated tour of Proxmox graphical user interface where you will spend most of your time managing a cluster, this book will get you up and running with the mechanisms of Proxmox VE. Various entities such as Cluster, Storage, and Firewall are also covered in an easy to understand format. You will then explore various backup solutions and restore mechanisms, thus learning to keep your applications and servers safe. Next, you will see how to upgrade a Proxmox node with a new release and apply update patches through GUI or CLI. Monitoring resources and virtual machines is required on an enterprise level, to maintain performance and uptime; to achieve this, we learn how to monitor host machine resources and troubleshoot common issues in the setup. Finally, we will walk through some advanced configurations for VM followed by a list of commands used for Proxmox and Ceph cluster through CLI. With this focused and detailed guide you will learn to work your way around with Proxmox VE quickly and add to your skillset. Style and approach This book is an inclusive and extensive handbook. It takes a pragmatic approach to complement your system admin skills and accomplish tasks within the Proxmox environment. It consists of illustrations and code-files to help you work with the data as you go from one recipe to the other.
Master building and integrating secure private networks using OpenVPN About This Book * Discover how to configure and set up a secure OpenVPN * Enhance user experience by using multiple authentication methods * Delve into better reporting, monitoring, logging, and control with OpenVPN Who This Book Is For If you are familiar with TCP/IP networking and general system administration, then this book is ideal for you. Some knowledge and understanding of core elements and applications related to Virtual Private Networking is assumed. What You Will Learn * Identify different VPN protocols (IPSec, PPTP, OpenVPN) * Build your own PKI and manage certificates * Deploy your VPN on various devices like PCs, mobile phones, tablets, and more * Differentiate between the routed and bridged network * Enhance your VPN with monitoring and logging * Authenticate against third-party databases like LDAP or the Unix password file * Troubleshoot an OpenVPN setup that is not performing correctly In Detail Security on the internet is increasingly vital to both businesses and individuals. Encrypting network traffic using Virtual Private Networks is one method to enhance security. The internet, corporate, and "free internet" networks grow more hostile every day. OpenVPN, the most widely used open source VPN package, allows you to create a secure network across these systems, keeping your private data secure. The main advantage of using OpenVPN is its portability, which allows it to be embedded into several systems. This book is an advanced guide that will help you build secure Virtual Private Networks using OpenVPN. You will begin your journey with an exploration of OpenVPN, while discussing its modes of operation, its clients, its secret keys, and their format types. You will explore PKI: its setting up and working, PAM authentication, and MTU troubleshooting. Next, client-server mode is discussed, the most commonly used deployment model, and you will learn about the two modes of operation using "tun" and "tap" devices. The book then progresses to more advanced concepts, such as deployment scenarios in tun devices which will include integration with back-end authentication, and securing your OpenVPN server using iptables, scripting, plugins, and using OpenVPN on mobile devices and networks. Finally, you will discover the strengths and weaknesses of the current OpenVPN implementation, understand the future directions of OpenVPN, and delve into the troubleshooting techniques for OpenVPN. By the end of the book, you will be able to build secure private networks across the internet and hostile networks with confidence. Style and approach An easy-to-follow yet comprehensive guide to building secure Virtual Private Networks using OpenVPN. A progressively complex VPN design is developed with the help of examples. More advanced topics are covered in each chapter, with subjects grouped according to their complexity, as well as their utility.
Ryan Oronzi is a paranoid, neurotic, and brilliant physicist who has developed a quantum military technology that could make soldiers nearly invincible in the field. The technology, however, gives power to the quantum creature known as the varcolac, which slowly begins to manipulate Dr. Oronzi and take over his mind. Oronzi eventually becomes the unwilling pawn of the varcolac in its bid to control the world.The creature immediately starts attacking those responsible for defeating it fifteen years earlier, including Sandra and Alex Kelley--the two versions of Alessandra Kelley who are still living as separate people. The two young women must fight the varcolac, despite the fact that defeating it may mean resolving once again into a single person.From the Trade Paperback edition.
Coercive diplomacy - the use of threats and assurances to alter another state's behavior - is an indispensable to international relations. Most scholarship has focused on whether and when states are able to use coercive methods to achieve their desired results. However, employing game-theoretic tools, statistical modeling, and detailed case study analysis, Power Plays builds and tests a theory that explains how states develop strategies of coercive diplomacy, how their targets shield themselves from these efforts, and the implications for interstate relations. Focusing on the World Trade Organization, Power Plays argues that coercive diplomacy often precludes cooperation due to fears of exploitation, but that international institutions can solve these problems by convincing states to eschew certain tools for coercive purposes.
"As sharp and slick as a switchblade--both excellent entertainment and an acute psychological portrait. Add Mark Pryor to your must-read list--I have."--LEE CHILD, #1 New York Times-bestselling authorDominic is a prosecutor, a musician, and an Englishman living in Texas. He's also a psychopath. His main goal is to hide his condition and lead a seemingly normal life in hopes to pay off his debts and become a full-time musician in Austin's club scene. But on one lousy day his carefully-controlled world starts to shatter: he's demoted at work and accused of stealing a fellow musician's song. He also meets a beautiful woman in a lime green dress--perhaps the biggest threat to his safety of all. At her urging, Dominic hatches a plan to steal a van he knows will be filled with cash. He picks two friends as accomplices, insisting on no guns and no violence. But a security guard catches them in the act and simple theft turns into capital murder. Cracks start to show in the conspiracy and, with no allegiance to anyone but himself, Dominic has to decide whether to stick by his partners in crime, or let his true nature come out to play.From the Trade Paperback edition.
From the pathological killer who gunned down the innocents at Virginia Tech to the average citizen who suspects the government is monitoring phone calls, the signs of suspiciousness and paranoia are all around us. In this comprehensive overview of an increasingly serious problem, an experienced psychologist and researcher describes what paranoia is, how and why it manifests itself, and the many forms it takes, including stalking, pathological jealousy, as a reaction to post-traumatic stress disorder, and perhaps even militia movements. Using striking vignettes from the present and the past, each chapter illustrates specific manifestations of paranoia while also describing in layperson's terms the clinical analysis of the condition. Among the topics discussed are the evolutionary origins of our "suspiciousness system" and factors that can trigger it today, the connection between illicit drug usage and paranoid behavior, PTSD, violent expressions of paranoia, and options for treating various kinds of paranoia.The author emphasizes that life in post-9/11 America is a fertile environment for paranoia; in an era of computer hackers, omnipresent security cameras, NSA surveillance, and terrorism, "normal" people have good reasons to be suspicious as their sense of security and privacy is undermined. But in such an insecure atmosphere, everyday suspicion can easily be ratcheted up, resulting in paranoia and occasionally violent outbursts. He warns of a possible epidemic of paranoia and suggests public health measures that could be used to counteract this potentially dangerous trend.Whether you consider yourself susceptible to paranoia or know others who might be, this enlightening book will help you understand the many factors that can distort your mental outlook.From the Trade Paperback edition.
In the Pacific during WWII, Billy Boyle must discover if skipper, and future president, Jack Kennedy is a cold-blooded killer.1943: In the midst of the brutal, hard-fought Solomon Islands campaign between the Allies and the Japanese forces, Lieutenant Billy Boyle receives an odd assignment: he's sent by the powerful Kennedy family to investigate a murder in which PT skipper (and future president) Jack Kennedy has been implicated. The victim is a native coastwatcher, an allied intelligence operative, whom Kennedy discovered on the island of Tulagi with his head bashed in. That's Kennedy's story, anyhow.Kennedy was recovering in the Navy hospital on the island after the sinking of his PT-109 motor torpedo boat. The military hasn't decided yet whether to make him a hero for surviving the attack, or have him court-martialed for losing the boat, and the last thing the Kennedy clan wants is a murder charge hanging over his head. Billy knows firsthand that he shouldn't trust Jack: the man is a charmer, a womanizer, and, when it suits his needs, a liar. But would he kill someone in cold blood? And if so, why? The first murder is followed by two more, and to find the killer, Billy must sort through a tangled, shifting web of motives and identities, even as combat rages all around him.
Ally Carter's megabestselling Gallagher Girls series meets Veronica Mars with a paranormal twist when Jillian Cade's (fake!) private eye service unearths far more than she bargained for.Jillian Cade doesn't believe in the paranormal, unlike her famous father, a professor and expert on the occult. Ever since he abandoned her to travel the world for "research," she's milked his reputation--and all the suckers who believe in the stuff--by taking over his private investigation firm. After all, a high school junior has to take care of herself, especially when she's on her own.Ironically, it's when she takes on a case that might involve a totally non-paranormal missing person that things get strange. Particularly when Sky Ramsey--a new boy at school who insists on becoming her partner--won't shut up about succubi, of all things.As they investigate, Jillian is surprised by her feelings for Sky, which threaten to derail the investigation. But that surprise is no match for the shock of learning that there may be something to Sky's succubi obsession after all.From the Hardcover edition.
Whispering breezes, clear mountain lakes--and her ex. Alexis Montgomery thought her marriage was fine. Sure, they were going through hard times, struggling to get pregnant--but she and Ian had chemistry, friendship, and love. Or so she thought, until she found the separation agreement waiting for her on the countertop. Ian Montgomery feels like life is spinning out of his control. He's got a new girlfriend, even if he can't remember why he's supposed to want one. His family clearly likes his ex-wife more than they like him. And then he inherits the romantic family cabin in the rolling Blue Ridge Mountains, where he and Alexis honeymooned. Or rather, they both inherit it. Together. A weekend alone with fresh air and fresh wounds seems like the worst thing that could happen to an ex-couple trying to keep it civil. But life is full of surprises--and Ian and Alexis are in for a big one...
An Intriguing Proposition Passion. Seduction. Pleasure. These are the qualities of any courtesan worth her salt. As owner of The Starling Club, London's most notorious house of ill-repute, Madame Philomena McGrattan has seen it all, heard it all, done it all. There is little that surprises her anymore, and even less that excites her. So when she is presented a chance at an irresistible seduction, she can't help but rise to the challenge. A Dangerous Game Studiousness. Practicality. Discipline. Such are the attributes of a good scholar, and such are the principles Lord Spencer Hornsby has built his life around. Alone in the Welsh countryside, with only his wolfhounds for company, Spencer has thrown himself into his work. There is little time for the pleasures of society, not even to think of the joys of the fairer sex. But when an unexpected guest arrives at his isolated hunting lodge, Spencer cannot help but be baffled by the presence of this dangerously beautiful woman. And when he discovers the reason for her arrival, and the pleasures she promises, he cannot help but find himself irresistibly intrigued . . . 40,000 Words
"Sarah Hegger has a gift for storytelling that is not to be missed. She's a personal favorite of mine."--Kathryn Le Veque, USA Today bestselling authorA Forbidden Love. An Undeniable Passion.The Lady The fair Lady Faye has always played the role allotted her. Yet the marriage her family wanted only brought her years of abuse and heartache. Now, finally free of her tyrannical husband, she is able to live her own life for the first time. But someone from the past has returned. Someone she has never been able to forget. The Warrior After years of servitude as a warrior for King and Country, Gregory is now free to pursue his own path: to serve God by becoming a monk. The only thing stopping him is Faye. Gregory has loved Faye since the moment he saw her. But their love was not meant to be. How can he serve God when his heart longs for her? He can neither forsake God nor the woman he loves. The Promise When Faye's son is kidnapped, Gregory answers her family's call for help, only to find that even in the most dangerous of circumstances, neither can fight their forbidden attraction. An attraction that now burns brighter than ever before. And it is only a matter of time until it consumes them both.
In order to fully inherit a millionaire's fortune, Allie Knowles must survive a month on her property--easier said than done when the enormous house is haunted by a violent ghost who claims to know Allie. But the true mystery lies with Cole Kinsley, the handsome groundskeeper. Cole and Allie have never met, though he's been driving her wild in her dreams for years. Yet now, every effort to get closer to him pushes him further away... Cole has only ever loved one soul and that love has endured for centuries. Now that soul rests within Allie's body and it takes everything in his power not to confess the truth. For her presence has put them both in mortal danger. Racing against the clock, Allie will have to break the ghost's curse--or history will be doomed to repeat itself.
An Unbreakable Bond Morgan Carter is a claimed werewolf. Only her mate, Greyson Crawford, has the right to protect her, and to love her. But that hasn't stopped rival packs from challenging Greyson's claim. Morgan is the last silver wolf--the only female with the ability to produce werewolf offspring, which means there are many who would defy pack law to make her their own. An Unstoppable Evil When war comes to the Silver Wolf Clan on the eve of The Summit, Morgan and Greyson have no choice but to fight for their kind. With the arrival of an ancient enemy, the two realize that the war has only just begun, and to survive the greatest threat they have ever faced, they must learn to trust each other again...
The love between a human and a Morgon, the dragon-hybrid race, tempts fate once more... All her life, Ella Barrow has allowed others to make her decisions. Forced to stifle her artistic talents and stay in a loveless relationship with Clayton Kerrington, the man her mother believes to be her perfect match, Ella's life may be safe--but it's not her own. Paxon Nightwing, on the other hand, is anything but the safe choice. A charming and alluring Morgon, Paxon sees Ella for the woman she truly is. His bold confidence and protective nature ignites a passion she's never felt before. But a dark family tragedy forces their secrecy--until Clayton makes it impossible to hide their clandestine affair. Will Ella be strong enough to fight for herself at last? Or will she succumb once more and risk losing the only man she's ever loved?
The definitive guide for inventors, newly updated with the latest patenting laws, information on crowdfunding, and online resources. The path to success is clearer than it's ever been! Thanks to experienced inventor Ronald Docie, the process of commercializing your invention and receiving royalties is no longer complicated. The Inventor's Bible is an in-depth how-to manual for both beginners and skilled entrepreneurs alike that helps you develop a realistic, workable plan, research your market, target potential business partners, and strike a good deal for your inventions. It tackles vital concerns, such as: What is my invention worth? What steps should I take first? Is free government help available? Who can I trust, and how can I keep from getting ripped off? Revised to reflect recent changes and innovations, this fourth edition includes: * Crowdfunding and Crowdsourcing * Open Innovation * Free Patenting Help * New U.S. Patent Laws * America Invents Act * Freedom to Use Law * Online Help for Inventors With The Inventor's Bible, your dream can become the world's next great invention.
Two teenagers fresh out of stir set their sights on what looks like easy money in Dolores Hitchens's Fools' Gold (1958)--and get a painful education in how quickly and drastically a simple plan can spin out of control. The basis for Jean-Luc Godard's film Band of Outsiders, Fools' Gold is a sharply told tale distinguished by its nuanced portrait of a sheltered young woman who becomes a reluctant accomplice and fugitive. This classic novel is one of eight works included in The Library of America's two-volume edition Women Crime Writers: Eight Suspense Novels of the 1940s & 50s, edited by Sarah Weinman.