Angebote zu "Various" (31 Treffer)

Kategorien

Shops

Origin of New York City's Nickname 'The Big Apple'
61,90 CHF *
ggf. zzgl. Versand

The monograph aims for a comprehensive look at the history of «The Big Apple», incorporating material that has come to light since the first edition of this work was published in 1991. The overall picture now is: Apples, always important, became especially so with the appearance of the Big Red Delicious Apple in Iowa, 1870’s. «The Big Apple» therefore came to refer to somebody or something very important. In 1920 an African-American stablehand in New Orleans mentioned in conversation: «We’s goin’ to ‘the big apple’» (NYC racetracks as the big time in horseracing). Turf writer John J. Fitz Gerald overheard this statement and adopted «The Big Apple» (1921ff.) in his columns, popularizing it to refer particularly to the NYC tracks. Secondarily it could refer to big time horseracing in general. In the 1930’s «The Big Apple» was picked up by black jazz musicians to designate NYC in general (and Harlem in particular) as the place where the greatest jazz in the world was being played. And in 1971 Charles Gillett revived «The Big Apple» as part of a public-relations campaign on behalf of NYC. Despite the increasingly clear picture of what happened, various incorrect etymologies have arisen about «The Big Apple». The monograph addresses and rejects them in some detail.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
Unlocking the Secrets of E-Book  Publishing
28,90 CHF *
zzgl. 3,50 CHF Versand

Advanced praise: 'A must-have resource for self-published authors! Packed with imperative information for navigating the channels.' - Robin Cutler, IngramSpark / Ingram Content Group 'Excellent! Better than anything I have seen in explaining publishing terms and options.' -William Kowalski, bestselling author, PEN Canada board member '…informative and accessible. Doris Booth knows what she's talking about. Listen to her!' -Patrick LoBrutto, editorial consultant, acquiring editor for Tor/Forge, Trident Media Group scout 'Authors and publishers would be wise to purchase this readable, well-organized, and invaluable guide to the intricacies of today's e-book publishing.' Lloyd J. Jassin, Publishing Attorney, Co-Author, The Copyright Permission & Libel Handbook Getting one's e-books into the most effective sales channels can be a daunting task for anyone, especially for those new to self-publishing. An author can have many questions, such as: What are the various distribution methods? How can you compare e-book retailers? What are the hidden pitfalls that can hinder the process? How can you clarify potential earnings? Do you really need Amazon just because they are big? Why do you need to understand Amazon's underlying motives before signing an exclusive deal? These and many more questions are answered in Unlocking the Secrets of E-Book Publishing, Get your books into sales channels (with or without Amazon). The short, easy-to-read little book is divided into two sections. Part One gives an overview of key e-book sales outlets, pricing policies, and restrictions, plus numerous tips, glossary and links to many resources. Retailers covered include Apple iBooks, Barnes & Noble Nook, Ingram Spark, Amazon, and Kobo Books, as well as third-party aggregators and more. A handy chart shows side-by-side royalty comparisons among major retail outlets. Part Two sheds light on Amazon's history, motivations and earning potential to help the self-published author assess the retail giant's effectiveness in an overall distribution plan.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
New York Aces: The First 75 Years
24,90 CHF *
zzgl. 3,50 CHF Versand

It was in the New York City area in the mid-nineteenth century that various pitching styles were invented, developments that changed baseball history. In 1883, the Giants became a powerhouse, hiring the finest pitchers in the country. In the twentieth century, the talent pool kept changing, but the quality did not. Christy Mathewson, 'Iron Man' McGinnity, and Rube Marquard all won more than two hundred games in the majors, and each played a part in many pennant victories for John McGraw's Giants. In 1921, the Yankees won their first championship, and their domination of the American League that followed was unprecedented. Pitching was both effective and exciting for New York fans, whether in Yankee Stadium or the Polo Grounds. New York Aces: The First 75 Years covers the history of pitching in the Big Apple, with equal attention to the American League and National League franchises.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
The Mobile Application Hacker's Handbook
78,90 CHF *
ggf. zzgl. Versand

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
Data Structures and Algorithms Made Easy in Jav...
48,90 CHF *
ggf. zzgl. Versand

Video Link: youtube.com/watch?v=l_GRquIrVyg A handy guide of sorts for any computer science professional, Data Structures And Algorithms Made Easy in Java: Data Structure And Algorithmic Puzzles is a solution bank for various complex problems related to data structures and algorithms. It can be used as a reference manual by those readers in the computer science industry. The book has around 21 chapters and covers Recursion and Backtracking, Linked Lists, Stacks, Queues,Trees, Priority Queue and Heaps, Disjoint Sets ADT, Graph Algorithms, Sorting, Searching, Selection Algorithms [Medians], Symbol Tables, Hashing, String Algorithms, Algorithms Design Techniques, Greedy Algorithms, Divide and Conquer Algorithms, Dynamic Programming, Complexity Classes, and other Miscellaneous Concepts. Data Structures And Algorithms Made Easy in Java: Data Structure And Algorithmic Puzzles by Narasimha Karumanchi was published in 2011, and it is coded in Java language. This book serves as guide to prepare for interviews, exams, and campus work. It is also available in C/C++. In short, this book offers solutions to various complex data structures and algorithmic problems. Peeling Data Structures and Algorithms for (Java, Second Edition):Programming puzzles for interviews Campus Preparation Degree/Masters Course Preparation Instructor's Big job hunters: Microsoft, Google, Apple, Amazon, Yahoo, Flip Kart, Adobe, IBM Labs, Citrix, Mentor Graphics, NetApp, Oracle, Face book, McAfee and many more Reference Manual for working people What is unique? Our main objective isn't to propose theorems and proofs about DS and Algorithms. We took the direct route and solved problems of varying complexities. That is, each problem corresponds to multiple solutions with different complexities. In other words, we ennumerated possible solutions. With this approach, even when a new question arises, we offer a choice of different solution strategies based on your priorities. Topics Covered: Introduction Recursion and Backtracking Linked Lists Stacks Queues Trees Priority Queue and Heaps Disjoint Sets ADT Graph Algorithms Sorting Searching Selection Algorithms [Medians] Symbol Tables Hashing String Algorithms Algorithms Design Techniques Greedy Algorithms Divide and Conquer Algorithms Dynamic Programming Complexity Classes Miscellaneous Concepts Target Audience? These books prepare readers for interviews, exams, and campus work. Language? All code was written in Java. If you are using C/C++, please search for 'Data Structures and Algorithms Made Easy'. Also, check out sample chapters and the blog at: CareerMonk.com

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
The Mobile Application Hacker's Handbook
51,00 CHF *
ggf. zzgl. Versand

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
The Mobile Application Hacker's Handbook
51,00 CHF *
ggf. zzgl. Versand

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
Mac User's Starter Guide - How To Master Mac In...
3,00 CHF *
ggf. zzgl. Versand

Whether you own apple MacBook pro, Mac laptop, IPad, or any other apple computer, it is time that you took the big step to master your Mac so that you can get the most mileage for the money you've paid! Now you can quit wringing your hands and wondering what to do next. When it comes down to head to head performance, it is the Mac that wins, hands down every single time. Consumers Reports gives Mac the nod as well as most professionals who what a superb outcome, such as musicians, writers, artists and photographers. For years, the big rub against the Mac compared to Windows has been the cost. PC users say that why spend the extra money for the Mac when you can get the same thing with a PC? Mac users say that the extra cost is well worth it when it comes to pure productivity, and there are much fewer problems with a Mac and you don't have to be aggravated with the gritty problems the PCs like to present to you. Probably one of the most aggravating issues that PC users have to put up with is the periodic need to upgrade to a new operating system just because Microsoft decides that they need a new profit center. The software makers all demand higher and higher capacity, so Microsoft comes out with a newer and more expensive version of Windows to run it. Can anyone spell collusion? As you learn and master the techniques that are mentioned in this eBook, you will continue to improve in your skill levels as well as obtaining increasing knowledge and confidence in your ability to use the Mac to assist you in whatever endeavor you are currently engaged in. Mac offers you a rare opportunity to excel at being very productive at whatever task you apply yourself, with a very positive result being a good probability. This book will show you how to use your Mac the way that you will get so much more out of its various resources. Also know that the more you use your Mac, the better you will become at optimizing you skills as well as increasing your productivity - Good Luck!

Anbieter: Orell Fuessli CH
Stand: 27.02.2020
Zum Angebot
The Mobile Application Hacker's Handbook
67,99 € *
ggf. zzgl. Versand

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Anbieter: Thalia AT
Stand: 27.02.2020
Zum Angebot