Results 41 to 50 of 92 | « previous | next »
- The enigma girl / by Porter, Henry,1953-author.(CARDINAL)741516;
- "From internationally bestselling author who is "filling the gap left by Len Deighton and John le Carré" (Evening Standard ) comes a propulsive espionage thriller for fans of Mick Herron, Daniel Silva, and Olen Steinhauer. Meet disgraced M15 agent Slim Parsons, a character who-like Lisbeth Salander-will sear your soul. Slim Parsons is all but burned. When her last deep-cover job for M15 ended with a life-and-death struggle on a private jet, she went on the run from her deadly target-a conniving businessman and money launderer codenamed "Hagfish." Now she's back at home, in hiding from her angry bosses in the Security Service, who have accused her of being overly violent and unsuitable for the role of an M15 operative. But after several months off the grid, Slim is called back to another job-Operation Linesman-where she is asked to infiltrate a news website Middle Kingdom whose explosive articles clearly show that they've hacked into the most high-security government databases. She accepts the assignment on condition that the Security Service searches for her missing brother. But Linesman turns out to be anything but simple. Slim uncovers a curious connection between the Middle Kingdom hackers and the legendary Bletchley Park codebreakers. Her new colleagues are becoming suspicious of her intentions, and Hagfish is out for revenge and threatening M15 itself as it all comes together in a shocking crescendo. And all the while she is being watched by someone even deeper in the shadows than she is"--
- Subjects: Spy fiction.; Novels.; Espionage; Undercover operations;
- The complete idiot's guide to protecting yourself online / by Gralla, Preston.(CARDINAL)273514;
- Subjects: Internet; Computer security.; Privacy, Right of;
- Principles of programming & coding / by Franceschetti, Donald R.,1947-editor.(CARDINAL)651222;
- Includes bibliographical references and index3D printing -- Algorithms -- American Standard Code for Information -- Interchange (ASCII) -- Android OS -- Application -- Autonomic computing -- Avatars and simulation -- Binary hexadecimal representations -- Boolean operators -- Branching logic -- Characters and strings -- Cloud computing -- Coding and encryption -- Color coding -- Combinatorics -- Comment programming -- Comparison operators -- Computer animation -- Computer memory -- Computer modeling -- Computer security -- Computer-aided design (CAD) -- Computer-aided design and computer-aided manufacturing software (CAD/CAM) -- Computer-assisted instruction (CAI) -- Conditional operators -- Constraint programming -- Control systems -- Cowboy coding -- CPU design -- Crowdfunding -- Crowdsourcing -- Cryptography -- Data mining -- Data warehouse -- Database design -- Database structuring conventions -- Debugging -- Device drivers -- Diffusion of innovations -- Digital divide -- Digital forensics -- Digital libraries -- Digital native -- Digital photography -- Digital signal processors (DSP) -- Digital watermarking -- Disk operating system (DOS) -- Drone warfare -- Drones -- E-banking -- E-learning -- Electronic circuits -- Electronic communication software -- Encryption -- Error handling -- Event-driven marketing (EDM) -- Expectancy theory -- Experimenter's bias -- Extreme programming -- Firewalls -- Firmware -- Functional electrical stimulation (FES) -- Game programming -- Gamification -- Graphical user interface (GUI) -- Graphics formats -- Guard clause -- HTTP cookie -- Imagined communities -- Incremental development -- Informational technology (IT) -- Information visualization -- Internet Protocol (IP) -- Inversion of control (Hollywood Principle) -- iOS -- Iterative constructs -- Java programming language -- JavaScript -- Knowledge worker -- Levels of processing theory -- Logic synthesis -- Logistics -- Machine learning -- Malware -- Massive open online course (MOOC) -- Meta-analysis -- Metacomputing -- Metadata -- Microprocessors -- Mixed methods research (MMR) -- Mobile apps -- Mobile technology -- Motherboards -- Multiprocessing operating systems (OS) -- Multi-user operating system (OS) -- Naming conventions -- Net neutrality -- Network security -- Neuro-linguistic programming (NLP) -- Neuromarketing -- Neuromorphic chips -- Objectivity -- Object-oriented design (OOD) -- Object-oriented programming (OOP) -- Privacy rights -- Programming languages -- Prototyping -- Quantum computing -- Random access memory (RAM) -- Rapid application development (RAD) -- Rational choice theory -- Search engine optimization (SEO) -- Semantic memory -- Semantics -- Signal processing -- Source code comments -- Spiral development -- Standard deviation -- Standpoint theory -- Statistical inference -- String-oriented symbolic languages (SNOBOL) -- Structural equation modeling (SEM) -- Technology in education -- Test doubles -- Theory of multiple intelligences -- Theory X and Theory Y -- Transformation priority premise (TPP) -- Tree structures -- Turing test -- Uncertainty reduction theory (URT) -- Unicode -- UNIX -- Variables and values -- Waterfall development -- Web design -- Web graphic design -- Working memory -- Worse-is-better -- Time Line of Inventions and Advancements in Programming and CodingThis new volume makes sense of the jumble of techno-jargon and programming acronyms for high school and undergraduate students. More than 125 entries explain the fundamental concepts, popular languages, systems, and protocols that go into computer programming.
- Subjects: Computer programming.; Coding theory.;
- Administrative assistant's and secretary's handbook / by Stroman, James.(CARDINAL)729337; Stroman, James.Administrative assistant's & secretary's handbook.; Wauson, Jennifer.(CARDINAL)461915; Wilson, K.(Kevin),1958-(CARDINAL)390209;
- Overview for the new administrative assistant -- Daily routine -- Telephone usage -- Mail services and shipping -- Travel arrangements -- Meetings -- Time management -- Keeping accurate records -- Office machines -- Telecommunications equipment -- Computer hardware -- Computer software -- Database management -- Computer networking -- E-mail -- Using the internet -- Web conferencing -- Spreadsheet software -- Data security -- Keyboarding skills -- Word processing -- Desktop publishing -- Using Powerpoint -- Troubleshooting computer problems -- Office ergonomics -- Glossary of computer terms -- The business letter -- Other written communications -- Forms of address -- Legal documents and terms -- Grammar -- Language, usage, and style -- Common English usage problems -- Spelling -- Pronunciation -- Punctuation -- Numerals -- Bookkeeping and accounting -- Business taxes -- Banking -- Special business and financial information for the small business -- Weights and measures -- Your future -- Presentation skills -- Communications skills -- Office management and supervision.
- Subjects: Handbooks and manuals.; Office practice; Secretaries;
- PHP and MySQL web development : a beginner's guide / by Matthews, Martin S.,author. ;
- Machine generated contents note: Part I: Getting Ready -- Ch 1: Setting Up Your Programming Workstation -- Ch 2: Building Web Pages with HTML -- Ch 3: Using CSS and Templates -- Ch 4: Adding Dynamic Elements with JavaScript -- Part II: Exercising the Server with PHP -- Ch 5: Introduction to PHP -- Ch 6: Fundamentals of PHP -- Ch 7: Reading and Writing Files -- Ch 8: User Authentication and Error Handling -- Part III: Creating and Using a Relational Database with MySQL -- Ch 9: Introduction to Databases, SQL, and MySQL -- Ch 10: Fundamentals of MySQL -- Ch 11: Adding, Modifying, and Deleting Tables and Records -- Part IV: Powering Databases with PHP and MySQL -- Ch 12: Connecting to and Accessing a MySQL Database with PHP -- Ch 13: Registering Users and Responding to Their Needs -- Ch 14: Providing For and Handling Online Purchases."This step-by-step tutorial shows you how to use PHP and MySQL to power websites with dynamic content. PHP and MySQL Web Development: A Beginner's Guide takes you from building static pages to ones with PHP and MySQL dynamic elements. Hands-on projects get you started using new skills right away!This solutions-oriented book is organized around real-world web scenarios that demonstrate the use of PHP and MySQL. These scenarios can be directly used to build web pages with dynamic content. Security topics such as validation, authentication, and encryption are addressed throughout. Each chapter teaches practical techniques that can be immediately applied Covers the basics of what drives many of today's most popular sites Ready-to-use code examples from the book available for download "--
- Subjects: PHP (Computer program language); MySQL (Electronic resource); Web site development.;
- Resumes that knock 'em dead / by Yate, Martin John.(CARDINAL)184035;
- Includes bibliographical references (pages 285-290) and index.
- Subjects: Résumés (Employment);
- Privacy / by Merino, Noël,editor.(CARDINAL)487862;
- Includes bibliographical references and index."Opposing Viewpoints: Privacy ... are selected from a wide range of highly respected sources and publications"--
- Subjects: Privacy, Right of;
- Retail inequality : reframing the food desert debate / by Kolb, Kenneth H.,1975-author.;
- Includes bibliographical references and index.What we got wrong -- A concept catches fire -- Food desert realities : perception, money, and transportation -- Food desert realities : social capital, household dynamics, and taste -- The "Healthy food" frame -- The problem solvers -- A path forward -- Epilogue -- Appendix : food desert media database."Retail Inequality examines the failure of recent efforts to improve Americans' diets by improving access to healthy food. Based on exhaustive research in Greenville, SC, Kenneth H. Kolb documents the struggles of two Black neighborhoods. Outsiders ignored their complaints about the unsavory retail options on their side of town until the emergence of the well-intentioned but flawed "food desert" concept. Soon after, new allies arrived to help, believing grocery stores and healthier options were the key to better health. Their efforts, however, did not change locals' food consumption practices. Retail Inequality explains why and outlines the history of deindustrialization, urban public policy, and racism that are the cause of unequal access to food today. Kolb identifies retail inequality as the crucial concept to understanding today's debates over gentrification and community development. As this book makes clear, the battle over food deserts was never about food--it was about equality"--
- Subjects: Food security; Grocery trade; Food consumption; Equality;
- Public records online : the national guide to private & government online sources of public records. by Sankey, Michael L.,1949-(CARDINAL)530987; Weber, Peter J.(Peter Julius),1952-(CARDINAL)659086;
- Includes bibliographical references.A national directory to government agencies and private companies that furnish online automated public record information, maintain proprietary public record databases, and offer CD-ROMs.
- Subjects: Directories.; Electronic public records; Public records;
- Invincible Iron Man. by Fraction, Matt.(CARDINAL)351239; Larroca, Salvador.(CARDINAL)340000;
- He's outrun Norman Osborn, and kept the database of superhuman secret identities safe and secure. But in doing so, Tony Stark has lost just about everything: his armor, his power - even his very mind. Now, at his absolute lowest point, it will take Tony's last reservoir of will - and a band of brothers including Thor, Captain America, War Machine and Black Widow - to keep from losing it all and sow the seeds for a brighter tomorrow. Stark Industries' arms-manufacturing days are over: Tony's new company, Stark Resilient, is bringing modern tech to the masses without bringing innocent people to their knees. But there's a competitor on the scene, a mother/daughter team with a very familiar name ready to pick up the slack with an armor called Detroit Steel. They've started a deadly game of international intrigue that will bring one of Iron Man's deadliest foes back into the fray - but for the Hammer girls, that was merely the opening salvo. With War Machine grounded by the Pentagon, Pepper missing the RT-charged heart that made her Rescue and Tony's Resilient team struggling to put their clean-energy tech into production, they're about to up the ante. Now, Iron Man's going to find out just what "resilient" really means.
- Subjects: Comics (Graphic works); Graphic novels.; Iron Man (Fictitious character); Good and evil; Heroes;
Results 41 to 50 of 92 | « previous | next »