Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Jason W. Freeman

Brung Up Proper

Brung Up Proper

Jason Manford

Ebury Press
2012
pokkari
The is the tale of a cheeky little sod from Salford called Jason growing up surrounded by his properly funny and most definitely shameless family and his discovery that being funny might actually get him somewhere.
Welcome To Coolsville

Welcome To Coolsville

Jason Mordaunt

Vintage
2004
pokkari
Nine days is a long time in Coolsville. More than enough time for Dr. Kiely Flanagan to shop business mogul J.P. Gillespie to a scandal-hungry media, collect the bounty and split for the sun. Time enough, Marshall McLemon hopes, to secure the backing he needs for his online museum exhibit, getting him - work wise at any rate - out of boresville and into something real. Papa Charlie McCormack is racing against the clock to discover if Sister Jasmine Ylang-Ylang is the type of nun that goes in for celibacy or not, and the directors of the WentWest Inc, are anxious to see an end to the year-long plague visited upon them by the cyber-terror organisation known as Mantra.Whether any of them succeed is something else, as one thing depends on the other in this finely balanced, gripping and often hilarious satire.
Choke Chain

Choke Chain

Jason Donald

Vintage
2018
pokkari
'An exceptional debut' IndependentAlex is twelve, and he lives with his younger brother and his parents in a dirt-poor white neighbourhood in 1980s South Africa. He and Kevin are trying to grow up, while their mother, Grace, is simply trying to keep them safe. Apart from the usual lessons of childhood, the boys are finding out about deceit, petty crime and casual violence, and the person that's teaching them is their father. A devious, self-centred, volatile man, Bruce Thorne sees the world as a battleground where the winner is the one who throws the first punch. Ruling the family through fear, it is only when he abandons them for a teenage lover that their problems really begin.Exposing the rotten, insidious patterns of fathering that most societies still ignore, Choke Chain shows two boys struggling to find steady ground in a disintegrating household. Watching quietly as their mother diminishes in the black light of her husband, they learn that not all adults are right and true - that some have evil bred, or beaten, into them. Opening with a thunderstorm and hail 'the size of apricots', this extraordinary first novel is a series of emotional storms and aftershocks, with any brightness on the horizon shadowed by gathering dark. Beautifully written and intensely moving, the novel builds to the drama of its conclusion: the turbulence turning to frenzy and clearing, finally, to some redemptive light.
Out of Shadows

Out of Shadows

Jason Wallace

Vintage
2012
pokkari
For Robert Jacklin - packed off without warning to boarding school in Zimbabwe - everything is terrifyingly new. As Robert is drawn slowly into Ivan's destructive web, he begins to question things he'd always held true and, as Ivan's grip tightens, he finds himself caught up in something far more dangerous than he could have imagined.
Lords of the Horizons

Lords of the Horizons

Jason Goodwin

Vintage
1999
pokkari
An evocation of the power of the Ottoman Empire, which swelled and declined over a period of six centuries. The book charts its history from the first campaigns to the Charge of the Light Brigade, from the Crusades to the Dardanelles, and aims to bring to life details of Ottoman life.
The Basics of Cyber Warfare

The Basics of Cyber Warfare

Jason Andress; Steve Winterfeld

Syngress Media,U.S.
2012
nidottu
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
Cyber Warfare

Cyber Warfare

Jason Andress; Steve Winterfeld

Syngress Media,U.S.
2013
nidottu
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
Java Cryptography Extensions

Java Cryptography Extensions

Jason R. Weiss

Morgan Kaufmann Publishers In
2004
nidottu
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
The Basics of Information Security

The Basics of Information Security

Jason Andress

Syngress Media,U.S.
2014
nidottu
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
Hedge Fund Governance

Hedge Fund Governance

Jason Scharfman

Academic Press Inc
2014
nidottu
Hedge Fund Governance: Evaluating Oversight, Independence and Conflicts summarizes the fundamental elements of hedge fund governance and principal perspectives on governance arguments. An authoritative reference on governance, it describes the tools needed for developing a flexible, comprehensive hedge fund governance analysis framework. Case studies and interviews with professional fund directors shine a bright light of pragmatism on this framework. The author’s global analysis of more than 5,000 hedge fund governance structures enables him to draw realistic conclusions about best practices. He also explores the value consequences of good vs. bad governance, estimating the actual dollar losses that can result from bad governance, as well as the operational and investment performance benefits of certain governance practices.
Building a Practical Information Security Program

Building a Practical Information Security Program

Jason Andress; Mark Leary

Syngress Media,U.S.
2016
nidottu
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
Liquid Acquisition Devices for Advanced In-Space Cryogenic Propulsion Systems
Liquid Acquisition Devices for Advanced In-Space Cryogenic Propulsion Systems discusses the importance of reliable cryogenic systems, a pivotal part of everything from engine propulsion to fuel deposits. As some of the most efficient systems involve advanced cryogenic fluid management systems that present challenging issues, the book tackles issues such as the difficulty in obtaining data, the lack of quality data and models, and the complexity in trying to model these systems. The book presents models and experimental data based on rare and hard-to-obtain cryogenic data. Through clear descriptions of practical data and models, readers will explore the development of robust and flexible liquid acquisition devices (LAD) through component-level and full-scale ground experiments, as well as analytical tools. This book presents new and rare experimental data, as well as analytical models, in a fundamental area to the aerospace and space-flight communities. With this data, the reader can consider new and improved ways to design, analyze, and build expensive flight systems.
Ephemeral Hunter-Gatherer Archaeological Sites

Ephemeral Hunter-Gatherer Archaeological Sites

Jason Thompson

Elsevier Science Publishing Co Inc
2016
nidottu
Archaeological Geophysics for Ephemeral Human Occupations: Focusing on the Small-Scale combines technological advances in near-surface geophysics with recent archaeological scholarship and underlying archaeological premises to provide a practical manual for guiding archaeo-geophysical research design. By proposing the amelioration of communication gaps between traditional and geophysical archaeologists, this book will foment dialogue and participate in bringing about new ways of thinking anthropologically about archaeological geophysics, especially in relation to prehistoric open-air ephemeral sites. Offering a way to begin a dialogue between archaeology and geophysics, Archaeological Geophysics for Ephemeral Human Occupations is an important reference for practicing professionals, instructors, and students in geophysics and anthropology/archaeology, as well as geology.
Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness

Jason Sachowski

Syngress Media,U.S.
2016
nidottu
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.
Coding for Penetration Testers

Coding for Penetration Testers

Jason Andress; Ryan Linn

Syngress Media,U.S.
2016
nidottu
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.
Embedded Systems

Embedded Systems

Jason D. Bakos

ELSEVIER SCIENCE TECHNOLOGY
2024
nidottu
Embedded Systems: ARM Programming and Optimization, Second Edition combines an exploration of the ARM architecture with an examination of the facilities offered by the Linux operating system to explain how various features of program design can influence processor performance. The book demonstrates methods by which a programmer can optimize program code in a way that does not impact its behavior but instead improves its performance. Several applications, including image transformations, fractal generation, image convolution, computer vision tasks, and now machine learning are used to describe and demonstrate these methods. From this, the reader will gain insight into computer architecture and application design, as well as practical knowledge in embedded software design for modern embedded systems. The second edition has been expanded to include more topics of interest to upper level undergraduate courses in embedded systems.
Understanding Female Offenders

Understanding Female Offenders

Jason M. Smith; Carl B. Gacono; Ted B. Cunliffe

Academic Press Inc
2021
nidottu
According to the Sentencing Project, between 1980 and 2017, the number of incarcerated women increased by more than 750%, rising from a total of 26,378 in 1980 to 225,060 in 2017 and the number continues to rise. Dealing with incarcerated women and specifically psychopathic women can be challenging. Understanding Female Offenders: Psychopathy, Criminal Behavior, Assessment, and Treatment provides readers with a better conceptualization of the psychopathic/non-psychopathic female. This includes better ways of interviewing, assessing, and treating these women, and clinical caveats with case examples to assist with clinical applications. This is the only comprehensive resource that provides specific knowledge about female offenders, particularly on female psychopathy and assessment.
Automotive Mathematics

Automotive Mathematics

Jason Rouvel

Pearson
2006
nidottu
Offering examples and applications tailored specifically to the automotive trades, Automotive Mathematics, 1st Edition, gives students a sound background in the mathematical skills necessary to be skilled and competent technicians. Early chapters of the text focus on fundamental mathematics skills such as ratios, percents, measurement systems and geometry; later chapters apply basic skills to topics such as engine balancing, camshaft event timing, modifying compression ratio, planetary gear ratios and hydraulics. Designed with versatility in mind, the text offers diverse problem sets (organized by level of difficulty), flexible organization, and in-depth examples that make math meaningful and relevant to the automotive technology student.
CUDA by Example

CUDA by Example

Jason Sanders; Edward Kandrot

Addison Wesley
2010
nidottu
“This book is required reading for anyone working with accelerator-based computing systems.” –From the Foreword by Jack Dongarra, University of Tennessee and Oak Ridge National Laboratory CUDA is a computing architecture designed to facilitate the development of parallel programs. In conjunction with a comprehensive software platform, the CUDA Architecture enables programmers to draw on the immense power of graphics processing units (GPUs) when building high-performance applications. GPUs, of course, have long been available for demanding graphics and game applications. CUDA now brings this valuable resource to programmers working on applications in other domains, including science, engineering, and finance. No knowledge of graphics programming is required–just the ability to program in a modestly extended version of C. CUDA by Example, written by two senior members of the CUDA software platform team, shows programmers how to employ this new technology. The authors introduce each area of CUDA development through working examples. After a concise introduction to the CUDA platform and architecture, as well as a quick-start guide to CUDA C, the book details the techniques and trade-offs associated with each key CUDA feature. You’ll discover when to use each CUDA C extension and how to write CUDA software that delivers truly outstanding performance. Major topics covered include Parallel programming Thread cooperation Constant memory and events Texture memory Graphics interoperability Atomics Streams CUDA C on multiple GPUs Advanced atomics Additional CUDA resources All the CUDA software tools you’ll need are freely available for download from NVIDIA. http://developer.nvidia.com/object/cuda-by-example.html
CSS3

CSS3

Jason Cranford Teague

PEARSON EDUCATION (US)
2010
muu
Learn CSS3 the quick and easy way with 2 hours of video lessons covering the important new features in CSS3. Best-selling author Jason Cranford Teague takes you through today's CSS essentials, including the following topics: Types of CSS Rules Using HTML5 Structure Working with Pseudo-Elements Adjusting Font Size for Understudy Fonts Adding a Text Drop Shadow Color Alpha Values Text Overflow Animation Transforming an Element Design/Progressive Enhancements After you finish watching the video, continue to build your CSS skills with the author’s extensive guide, CSS3: Visual QuickStart Guide.