- Table View
- List View
When Neil Andertol and a motley crew of video-gaming whizzes accidentally download top-secret training software and are recruited by the military to restore a botched aircraft mission, they're no longer playing for points--they're playing to save the world! Part action movie, part slapstick comedy, debut author Jeff Miller's Nerdy Dozen is a madcap adventure for the middle grade set.
A Deadly Epidemic was Sweeping across Pern! Everyone, holder and dragonrider alike, pitched in to help-except Nerilka's father, who refused to share Fort Hold's bounty with the other Holds. So, ashamed of her family and determined to do her part, Nerilka packed up medicines and supplies and sneaked off to aid her people. Her quest to help wherever she was most needed led her finally to Ruatha Hold, where Lord Alessan was frantically preparing the precious serum needed for mass inoculations against the ...
This book tells you how two friends did it, and how you can do it too. It's not a diet devised by some bossy string bean who has never been more than 7 pounds overweight, nor by a fat middle-aged doctor, but a real, long-term, workable diet for real people. A modified and therefore bearable low-carb, high-protein way of eating, the diet really works and includes meal plans, recipes, advice on clothes, make-up and hair at every stage from fat to thin. It doesn't include impossible exercise routines or disgusting things to eat. Above all, it gets to the bottom of why we overeat--and shows you how to stop. There's never been a diet book like it--for women, by women, with jokes and useful tips, and advice that is truly simple to follow. What other diet book tells you to pour yourself a large drink at the end of the day, because you've earned it?
The Roman emperor Nero is remembered by history as the vain and immoral monster who fiddled while Rome burned. Edward Champlin reinterprets Nero's enormities on their own terms, as the self-conscious performances of an imperial actor with a formidable grasp of Roman history and mythology and a canny sense of his audience. Nero murdered his younger brother and rival to the throne, probably at his mother's prompting. He then murdered his mother, with whom he may have slept. He killed his pregnant wife in a fit of rage, then castrated and married a young freedman because he resembled her. He mounted the public stage to act a hero driven mad or a woman giving birth, and raced a ten-horse chariot in the Olympic games. He probably instigated the burning of Rome, for which he then ordered the spectacular punishment of Christians, many of whom were burned as human torches to light up his gardens at night. Without seeking to rehabilitate the historical monster, Champlin renders Nero more vividly intelligible by illuminating the motives behind his theatrical gestures, and revealing the artist who thought of himself as a heroic figure. Nero is a brilliant reconception of a historical account that extends back to Tacitus, Suetonius, and Cassius Dio. The effortless style and artful construction of the book will engage any reader drawn to its intrinsically fascinating subject.
Rob Finn was a bit of a misfit: a struggling young jockey in a family of accomplished musicians, a man in love with a beautiful woman who wouldn't have him -- he suddenly looked like a rider who had lost his nerve. Could it be, though, that the horses were unusually sluggish, and that there was something more sinister attempting to sabotage him. . . ' "The best thriller writer going. " ATLANTIC MONTHLY
Renowned sculptor Roy Valois receives the worst news since learning of his adored wife Delia's death in South America fifteen years ago. His doctor tells him he's dying-and a morbid curiosity about how he'll be remembered inspires Roy, with the help of a local computer geek, to hack into a newspaper's system to read his pre-written obituary. But the death notice includes a small discrepancy about his late wife-and by calling the mistake to the attention of the surprised obit writer, Roy has inadvertently sealed an innocent man's doom. Suddenly Roy has a mission: to uncover the truth about the woman he can't stop loving--secrets guarded by powerful forces who believe murder is an acceptable price for keeping them buried. With his disease-ravaged body's final betrayal rapidly approaching, Roy must somehow stay alive long enough to find the answers: Who was Delia? How did she die? Why did she die? Did she die?
With friends turning into enemies, can Drew find his way out of this war alive? The entire kingdom of Lyssia is now at war, and the battle lines have been drawn. While Drew and his ragtag army defend the throne against Ratlords and Crowlords, Gretchen and Whitley venture on a harrowing journey through the perilous Dyrewood. But none of the werelords counted on the return of the most terrifying monster of them all...
A STING SO DEADLY After weeks of casing a ranch for its prized remuda, a gang of horse thieves pillage everything--leaving the owner's wife dead. Before the distraught man can drown himself in booze, Harry Pendergast of the Denver Detective Agency offers him a chance for vengeance. Because this time, the victim is Brad Storm...aka the Sidewinder. It seems that Brad's ranch isn't the only one that's been brutally hit. There's a huge reward to track down the powerful thieves. But the hunt won't be easy, taking the Sidewinder into dangerous territories and bloody battles. So when a showdown in Wild Horse Valley becomes imminent, Brad hatches a plan--one he hopes will have the villains recoiling in fear before the Sidewinder strikes back.
ABBY IS WORKING FURIOUSLY to finish the centerpiece of The Nature Museum's "Wonderful World of Wings" exhibit, to be shown at the Leavenworth Bird Fest. She is also trying to brush up on her movie trivia now that the island's young people have sponsored "Cinema Classics" movie night. When her old beau from Cornell University unexpectedly appears, Abby is caught up in a whirlwind of romance, all the while trying to figure out who is responsible for the ring of credit card theft that has plagued the community. Could it be one of the youngsters she has become so fond of ? Or her long lost love? And can she corner the culprit before tourists get wind of the problem?
Highly recommended for beginners, students, and professionals, this book covers the unknown or hidden areas of NET implementation, starting from the basic to the advanced level-from NET Framework to OOPS to remoting to web services, i.e. VBNET, C#NET, and ASP NET; from ADO NET to XML, XSL, and XSLT; from Remoting, which forms the basis for advanced BizTalk, to SharePoint; from smart devices to Web Services and NET Framework 3.0 that discusses WPF, WF, WCF, and WCS foundations, and much more. Contents:- Framework ? Programming Concepts ? OOPS ? Windows Forms Controls ? ADO NET ? eXtensible Markup Language (XML) ? Remoting ? ASP NET NET Compact Framework ? Web Services NET Framework 3.0
From the #1 New York Times bestselling creators of Op-Center comes a different kind of law enforcement. In the year 2010, computers are the new superpowers. Those who control them, control the world. To enforce the Net Laws, Congress forms the ultimate computer security agency within the FBI: the Net Force.
A report from the International Monetary Fund.
Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there's now a book that shows you how to avoid such costly and time-consuming mistakes. It's called .NET Gotchas . The ultimate guide for efficient, pain-free coding, .NET Gotchas from O'Reilly contains 75 common .NET programming pitfalls--and advice on how to work around them. It will help you steer away from those mistakes that cause application performance problems, or so taint code that it just doesn't work right. The book is organized into nine chapters, each focusing on those features and constructs of the .NET platform that consistently baffle developers. Within each chapter are several "gotchas," with detailed examples, discussions, and guidelines for avoiding them. No doubt about it, when applied, these concise presentations of best practices will help you lead a more productive, stress-free existence. What's more, because code examples are written in both VB.NET and C#, .NET Gotchas is of interest to more than 75 percent of the growing numbers of .NET programmers. So if you're a .NET developer who's mired in the trenches and yearning for a better way, this book is most definitely for you.
Culture Smart! provides essential information on attitudes, beliefs and behavior in different countries, ensuring that you arrive at your destination aware of basic manners, common courtesies, and sensitive issues. These concise guides tell you what to expect, how to behave, and how to establish a rapport with your hosts. This inside knowledge will enable you to steer clear of embarrassing gaffes and mistakes, feel confident in unfamiliar situations, and develop trust, friendships, and successful business relationships.Culture Smart! offers illuminating insights into the culture and society of a particular country. It will help you to turn your visit-whether on business or for pleasure-into a memorable and enriching experience. Contents include* customs, values, and traditions* historical, religious, and political background* life at home* leisure, social, and cultural life* eating and drinking* do's, don'ts, and taboos* business practices* communication, spoken and unspoken"Culture Smart has come to the rescue of hapless travellers." Sunday Times Travel"... the perfect introduction to the weird, wonderful and downright odd quirks and customs of various countries." Global Travel"...full of fascinating-as well as common-sense-tips to help you avoid embarrassing faux pas." Observer"...as useful as they are entertaining." Easyjet Magazine"...offer glimpses into the psyche of a faraway world." New York Times
In a letter to her friend, Nettie remembers her trip to the pre-Civil War South. She remembers the sweet cedar smell in the air and the sun pressing on her head. But she also remembers Tabitha, the slave at the hotel who has only that one name, and she remembers the heaps of rags the slaves use for beds. Most of all, though, she remembers the slave auction where people were bought and sold like sacks of flour. Nettie can't forget these images, and she can't help but wonder what life would be like if she were a slave...<P><P> Based on the diary of the author's great-grandmother, this is a poignant and compelling look at slavery through the eyes of a young girl. Once read, it is not soon forgotten.
This book first covers the basics on each topic clearly and then gives examples, so that you understand the topic clearly and can work on it independently after you have worked through the book. This book is for Network Administrators who would like to work with FreeBSD and are looking for skills beyond installation and configuration of FreeBSD.
of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them.Understand the fundamental concepts of computer network exploitationLearn the nature and tools of systematic attacksExamine offensive strategy and how attackers will seek to maintain their advantageUnderstand defensive strategy, and how current approaches fail to change the strategic balanceGovernments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.
A practical, hands-on guide, that provides you with all the tools you need to visualize and analyze your data using network graphs with Gephi.This book is for data analysts who want to intuitively reveal patterns and trends, highlight outliers, and tell stories with their data using Gephi. It is great for anyone looking to explore interactions within network datasets, whether the data comes from social media or elsewhere. It is also a valuable resource for those seeking to learn more about Gephi without being overwhelmed by technical details.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
Teach yourself how to use the networking features in Windows 7 to connect your home computers, even if they use different operating systems. With Step by Step, you set the pace -- building and practicing the skills you need, just when you need them! Network your Windows 7-based PCs and set up security Add a Mac or Linux-based computer Share printers, devices, and files with everyone in your home Stream media over your network or to a remote PC Tweak your network and sharing settings Troubleshoot problems and perform easy maintenance Your Step by Step digital content includes: Fully searchable online edition of this book -- with unlimited access on the Web
This book shows nonprofits a new way of operating in our increasingly connected world: a networked approach enabled by social technologies, where connections are leveraged to increase impact in effective ways that drive change for the betterment of our society and planet.
Thoroughly revised to cover the latest technologies, this practical resource provides you with a solid foundation in networking fundamentals. Networking: A Beginner's Guide, Sixth Edition discusses wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, and virtualization. You'll also get step-by-step instructions for installing, configuring, and managing Windows Server 2012, Exchange Server 2013, Oracle Linux, and Apache. This is the perfect book for anyone starting a networking career or in need of an easy-to-follow refresher.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.