Google
 

MOVIE DIRECTOR SPIELBERG’S INTERPRETATION OF THE CONTEXT OF THE NOVEL THE COLOR PURPLE

Director Stephen Spielberg has rightly highlighted the context of the novel in a subtle way by focusing on how Celie explores herself through different experiences instead of letting the audience baffled and disgusted by showing that the black men are made of pure evil. In a way, he has tried to present this slave narrative by taking the focus off black men and putting the focus on black women's struggle against society's injustices. as in the case of Shug taken by everyone has a corrupt beautiful singer and Sofia who defiantly stood against white women and thus as a result was thrown into it. The novel gives graphic details of the exploits by her father which while adapting could have instigated many reactions among the critics and the black community but Spielberg made it a PG-13 movie in order to avert any controversy. Spielberg has emphasized upon the theme of love and how this love binds humanity together instead of gory details of the atrocities committed by black men on black women or by white people on black slaves.


Spielberg seems to be interested in the universally accepted smile that shy Celie gives in the start, that smile continues till the very end but the authority of Celie and her smile changes at the end of the movie. Her smile in the end is empowering for her African children that came to meet her. Celie's stepfather comments on Celie's smile by saying, "Celie, you've got the ugliest smile made out of creation" which we as audience know that it is incorrect. Celie, played by Whopi Goldberg, gives a sweet child like smile that gives a refreshing feeling whenever the movie gets tense. Her smile provides relief in the movie.


The Color Purple is an epistolary novel which revolves around the life of Celie who writes letters to God. Spielberg does take into account the importance of letters in the novel by starting the movie with a letter that is being read by Celie but he leaves out the vivid description of Celie's abuse by her step father. The letter lays bear the absurd situation Celie and Nettie were in: the incestuous relation with their father and its consequences in the form of illegitimate children. The movie tries to start as raw as the novel but fails to capture the sexual exposition as the novel suggests. The impression of male members of Black community from the beginning comes as brutish and unsympathetic. Celie, Nettie, Sofia, Shug Avery comes out as women of great importance. Celie and Nettie love each other but in a community where black men treat black women ruthlessly they are not able to flourish their love. They suffer at the hands of Mr.___ who forces Nettie to leave his house when she came to meet Celie. Mr.___ tried to exploit Nettie but Nettie fought against Mr.___ advances and thus as punishment she was separated from Celie.  

The aspect of Women as an inanimate object is revealed in the movie when Mr.____ comes to take the hand of Nettie for marriage but her stepfather says only Celie is available. Mr.____ says he wants to see Celie if Nettie is not available for marriage. Celie's stepfather calls her and asks her to move herself in circle for Mr._____. Celie's stepfather's boy comments on it by saying "What's she doing that for", stepfather to this gives a smile and replies "your sister thinking about marriage". This act makes Celie a mere object of meat that is being showcased by his step father. Mr.____ doesn't even want Celie in marriage but his desperation and lust overlooks his preferences. This is the reason why later in the movie Mr.____ tries to rape Nettie.


When Shug Avery first meets Celie, she says: "You as ugly as sin." But when Shug comes to witness how Celie is maltreated by her husband she changes her perception and becomes softer towards Celie. She even becomes Celie's protector against the atrocities committed by her family. Shug provides the confidence to Celie by saying that her smile is beautiful and from that moment onwards Celie begins to generate the power to fight her abusers. Shug kisses Celie and we realize in this scene that it is the first time Celie has been willingly involved herself in something intimate. This relation becomes evident in the movie when Celie tells Shug that she does not tell her that she used to go into the purple color fields. Shug replies by saying, "I think it pisses God off when you walk by the color purple in a field and don't notice it." The color purple here symbolizes their lesbian relationship and to emphasize on it Spielberg begins the movie by showing us lavender.


Sophia (Oprah Winfrey), wife of Harpo, was also amazed by how Celie was treated by Mr.____ in her own home. Sophia was of the marginalized black community but she was not afraid of anything. But this does not go in her favor when she hit a white woman in the face and was sentenced to ten years in jail. Celie became confident like Sophia when she sits on the table for the last time with the whole family and starts her reaction towards everything unjust that has been going on in her life. This part is adapted in the movie where Sophia is ironically sitting opposite to her and she starts smiling. From this point onwards the curse of black women suffering as slave inside their own home is broken and Celie sees her luck shine, as she comes to know that her share of property that was given by her late aunt still exists. The last scene in the movie is when Celie's African children come to meet her and call her "mama" and at the same time Mr.____ is seen around the house, as he comes to apologize for everything he had done.


The context of the novel Spielberg presents is interesting take on the novel as he has willingly cut the horrific incidents mentioned in the novel meted out to Celie but at the same time, he manages to portray the injustices black men and black woman in particular had to suffer.

PRIMARY CONCERNS OF THE NOVEL THE COLOR PURPLE BY ALICE WALKER

The Color Purple by Alice Walker has been awarded the Pulitzer Prize for Fiction and the National Book Award. It addresses numerous social, cultural and political issues which were rampant at the time Walker wrote this novel. Some of the primary concerns the novel focuses on are violence against women, gender issues, religion and spirituality, love and sexuality, female solidarity and racism.

 

Walker calls herself a "Womanist" writer. Womanism is a term coined by Walker herself, which says that 'Womanist is to feminist as purple is to lavender'. According to her, feminism does not encompass the perspectives of Black women. Womanism addresses the race and class issues that are not addressed by white feminism. Womanism also 'seeks to acknowledge and praise the sexual power of Black women while recognizing a history of sexual violence'.  This is precisely what the novel does. One of the primary concerns of the novel is to create awareness of how black women are doubly oppressed. They are not only discriminated against for the color of their skin but also oppressed by the men in their own community. They are constant victims of violence, including sexual violence. The protagonist Celie is first raped by her stepfather and then constantly abused by her husband. She is belittled by them to such an extent that she feels like she has no existence of her own in the world. Explicit sexual details are given of Celie's rape in the opening pages of the book. According to Walker, the graphic details of Celie's sexual exploitation were given to "strip away the lie that rape is pleasant, that rapists have anything at all attractive about them, that children are not permanently damaged by sexual pain, that violence done to them is washed away by fear, silence and time..." and Walker successfully voices these concerns in her book. Walker points out that not only Black women of Southern America, but the women of Africa are also oppressed by men. The Olinka tribe believes that "A girl is nothing to herself; only to her husband can she become something."(140).

 

One of the main concerns of the novel is to revise images of black women by "taking the familiar and negatively constructed sexual images and imbuing them with power' (Bobo, 1995: p65). Walker emphasizes that gender and sexuality are not as simple as we may believe. Her novel challenges and defies the traditional ways in which we understand women and men. One of the ways in which she does this is through her portrayal of the character Sofia. She is strong willed, stubborn and a hard worker, often appearing very unfeminine. She is portrayed as being more masculine than her husband Harpo, who repeatedly gets beaten up by her and tries hard to suppress her. Walker concedes that the idea of a fair and feminine heroine was no longer acceptable as an illustration of a black heroine. '…although Sofia's physical presence and manner of rebellion are much more omnipresent and overt, her story brings to mind battles by earlier black women…' (Bobo, 1995: p66).

 

The title of the novel itself suggests one of the concerns focused on by Walker. Shug  tells Celie that "I think it pisses God off if you walk by the color purple in a field somewhere and don't notice it…" What she means is God puts these little things in the world to show us we are loved. To be able to take joy in little things such as purple flowers is what helps one move on in life. After Shug points this out to Celie, the reader finds a positive transformation in her. "Purple" changes from a color of violence and abuse to one of joy and spirituality.

 

Religion and spirituality are important concerns of the novel. The image of God is transformed from a white-man's God to one of a gender-less and race-less God. The traditional Christian God is replaced by a more universal and benevolent God. Nettie points out that "It is the pictures in the bible that fool you." (120). All the pictures are of white men, so one starts assuming that God is a white man too.  As the novel proceeds and Celie becomes aware of whom her real father is and his lynching, she stops writing to God. Celie sees God as a tall, gray-bearded white man wearing long robes, who acts like all the other men she has known, "trifling, forgitful and lowdown." She blames God for all her suffering. Shug changes Celie's bitter view of God and religion and helps her move towards spirituality. She realizes that loving the world, herself and other people is the way to love God. Walker points out that rejection of religion is not the answer, one has to change one's outlook on the traditional concept of an anthropomorphic God. Not being tied to what God looks like frees us. God cannot be found in religious scriptures rather as Shug points out, "God is inside you and inside everybody else…"

 

One of the primary concerns of the novel is love and sexuality. Walker does not focus on the traditional idea of love between a man and a woman only; rather it can have various forms. It is about self-sacrifice and unconditional care, as is evident through the relationships of Celie with her sister and Shug.  The novel is full of characters exchanging spouses and lovers. The lesbian relationship between Shug and Celie is one of the few examples of genuine love. Indeed, the lack of love in society and the importance of accepting it, in whatever forms it appears are concerns which Walker encompasses in her book. She points out how sex is seen by Celie, a victim of rape, as a form of violence and duty only. This view is revised later on in the book when she experiences a relationship with Shug which is based upon mutual love and respect. Walker provides sexual empowerment to the Black women as is evident through Shug's character.

 

Female solidarity and sisterhood is an important concern addressed by Walker. In a male-dominated society, women find joy, strength, freedom from oppression, and self-determination only when they stick together and support each other. Sofia's ability to fight comes from her strong relationships with her sisters. Nettie's relationship with Celie helps her through years of living in the unfamiliar culture of Africa. Samuel notes that the strong relationships among the Olinka women are the only thing that makes polygamy bearable for them. Celie's strong bond with Shug enables Celie to break free from oppression and develop a sense of self. Samuel's wife refuses this solidarity and is eventually destroyed. When women start forming relationships that have a healing quality to it, it takes on a domino effect and gradually encompasses various women of the community. First, Shug's relationship with Celie emancipates her and then Squeak develops her own identity and rebels against Harpo. Next is Sofia who finally manages to break free from the damaging effects of her imprisonment and her sense of self is restored. Walker makes women's communal empowerment a primary focus of her novel.

 

Racism and discrimination are also an important social concern of the novel. It reveals the harsh social and economic difficulties facing the black community in the rural South. Celie's father was lynched because he was doing better at business than the whites around him. Sofia is imprisoned because she refuses to become a white woman's maid and tries assaulting the mayor. Instead she is severely beaten, is thrown in jail for eleven years and is bailed out only to become the same white woman's maid.

 

Another important concern of the novel is the betrayal by one's own people and the consequences of living in denial. Through the story of the Olinka tribe, Walker portrays how betrayal does not necessarily have to come from outside. It can come from one's own people. As Nettie points out, it was the Africans who sold them into slavery and seem to have no regrets about it. In the past, it is the chief of the tribe who sells Olinkan land to a rubber manufacturer and clears the roof-leaf trees which the tribe worships. As a result, many houses are destroyed by rains and whole families are wiped out. Later on, many villagers like the Olinkans themselves help to clear the Olinka forests so that rubber trees can be planted. The tribe's condition becomes worse because "the people live like ostriches" (154). They live in denial and are not ready to confront the harsh reality which awaits them. As a result, their hunting territory and their forests are destroyed. Their land ownership is taken away and they have to pay rent on their land and water tax.

 

Finally, Walker also acknowledges that "There is so much we don't understand. And so much unhappiness comes because of that."(172). Celie remains miserable until she starts comprehending her surroundings as well as her own self. She bears all the injustices meted out to her by her stepfather and husband because she believes that the Bible orders women to be obedient and subservient to men. Similarly, Samuel's wife Corrine misunderstands her husband's relationship with Nettie and it annihilates her from inside. She only realizes the truth when it is too late.

 

Walker's novel The Color Purple adequately portrays various social, political and religious concerns which affected the Black community of not only the early twentieth century but also those that are still prevalent in the present time. Indeed some of the primary concerns of the novel are universal.

 

 

 

 

 

 

 

THE MAJOR HISTORICAL EVENTS OF THE 20TH CENTURY AND THEIR EFFECT ON THE AMERICAN LITERATURE INCLUDING HEMINGWAY’S WRITING - Fictional writer - Vye -

Major Historical Events of the early 20th Century in American Society:-
The three major historical events of the 20th century were the First World War that broke in 1914. The second important event was The Great Depression that was a severe worldwide economic depression in the decade preceding World War II. The timing of the Great Depression varied across nations, but in America it started in about 1929 and lasted until the late 1930s.The third most important historical event was the Second World War that occurred in 1939.

Effects of the Major Historical Events On Society:-
The affects of these events were immense as War changed the mindset of the whole society, making them rebel against the norms. After the World War I, the second great shock that in twentieth century was faced by America was the Great Depression of the 1930s. The Americans, being proud of their prosperous past were not able to cope with the adverse circumstances as the past comforts were in sharp contrast to the new difficulties.   Politically, America became strong after World War 1. It rose to become the major superpower of the world but unrest was created in the people due to the anti-war sentiments.  The experiences of the war in the west led to a sort of collective national trauma. The optimism of 1900 was entirely gone and those who fought in the war became to known as 'the Lost Generation' because they never fully recovered from their experiences. The large-scale migration after World War, also posed a threat to the country's stability. The immigrants began to be treated with suspicion and distrust. People had become disillusioned from religion due to the innovations posed by science, but seeing the destruction caused by scientific inventions during the war, disillusioned them from science as well consequently this generation became empty and hollow from inside. Women became more active in the affairs outside home. Soldiers left behind helpless families. The sense of family life was disturbed and shattered. People became pessimistic about the future, as they had lost faith in the possibilities of human potential. Fear and uncertainty was created in people's psyche.

Major Writers and Themes of the Post War Era
Historical and social changes have always molded the novelists' perception while writing. This phenomenon is particularly visible with regards to post-war literature. The early twentieth century was dominated by cataclysmic events. The Americans survived the two World Wars and overcame the economic upheaval of the Great Depression. They won, but were not victorious. These events reverberated through society and left a devastating psychological impact. In the novels of the era during and after world war, Man's helplessness in facing different events was portrayed tragically.  

The major thematic concerns of these times inadvertently focused on how the individual had to combat with the restrictions and impediments posed by society. In addition, the extreme emptiness felt by the Lost Generation became a recurrent theme in the writings of this era. After the World Wars, Man became rootless and alienated from tradition. This loss of tradition was accompanied by moral degeneration and a resurgence of the meaninglessness of life. Man in these times was seen as fighting against a malignant Natural world. 

As Daiches (1960) comments:

"The loss of the confident sense of a common world, of a public view of what was significant in human action…had an effect on both the themes and the technique of fiction."

D.H. Lawrence, Virginia Woolf, James Joyce, Franz Kafka and Ernest Hemingway were the major writers of this era. D.H. Lawrence was one of the notable literary figures in the early twentieth century. His works are a reflection of the major modern issues. He focuses upon the destructive effects of the so-called modernity (an effect of the World War). He writes about the dehumanizing effects of industrialization and explores the nature of individuals and their relationships with one another. Similarly, Franz Kafka's works reflect the anguish and guilt of Modern Man. Kafka builds up the grim mood of individual tragedy that is common to many of his contemporaries, which had its roots in the grim experiences of War on that generation. Kafka himself is said to have stated:
"I think we ought to read only the kind of books that wound and stab us … we need the kind of books that affect us like a disaster, that grieves us deeply, like the death of someone we loved more than ourselves, like being banished into forests far from everyone, like a suicide."

Major Influences in Hemingway 
In Hemingway's works there is a disillusionment caused by the horrors of war. The hard realities of life, like that of a sudden death or any sudden loss, are depicted in his writings. Both physical and mental/emotional disturbance is to be found under scrutiny in his works. The past child-like faith in happy endings is negated by Hemingway. He gives a lesson of courage even while knowing how the reward might not be given, even to those who remained courageous.

Hemingway's life and his writings were influenced by many personal and public events and  The First World War provided Hemingway with experiences, which made him a more mature man and changed the inflexible ideas and illusion of his youth. Especially his experience of being wounded in the First World War was not only a physical but also an emotional wound.This unkind display of indifferent death familiarized him with the depressing reality of life. (Young, 1968)  
During his recuperation, he saw many wounded soldiers who were suffering from great stress after confronting the calamities of their lives in different ways. After this injury, Hemingway had no desire to maintaining his gay, courageous mood of his youthful ideals regarding the glory of war. (Dimri, 1998)

Another fundamental influence or experience on Hemingway and his writing is his association with a nurse named Agnes Von Kurowsky whom he met in the hospital while he was injured. His contact with her later developed into a romantic affair. In this context Baker (1972) comments

"Young women like Agnes Von Kurowsky were soon aware of a newly aggressive sexuality, (i.e., people like Hemingway) hitherto sublimated but now brought forth by the long confinement in bed, the kindly attention of pretty nurses, and a romantic setting of a hospital in wartime Milano."

It was intrinsically absurd that a badly injured soldier, who had experienced the failure of the delusion of immortality a few weeks after he enlisted, fell in love with a nurse. This same absurdity which is found in his life is also found in his writings as well. The harshly injured heroes are seen falling in love in spite of their dark vision of life during war.  
It became difficult for Hemingway to adjust in society after returning home from war. The experiences that he had undergone were very different from the norm. The time that he spent in Italy created a sense of tragic adventure. He found it hard to live an ordinary existence at home. (Gurko, 1968) 

The Spanish Civil War is one of the greatest influences on Hemingway. When the war started in 1936, Hemingway began reporting on it. Many of his short stories therefore are set in Spain. Among them The Undefeated, Today is Friday, The Killers, The Butterfly and The Tank, and Night Before Battle stand out. In all these stories, he threw light on the suffering of Spaniards.
The element hope or faith is prevalent in Hemingway's work – whether it's the presence or absence of such emotions. At this connecting in Hemingway's works Dimri (1994) says:

'As a matter of fact Hemingway is the most unconventional of modern writers. It is difficult to define him within the boundaries of religion or a particular philosophic group. He has been called by all available names __ existentialist, wounded idealist, romanticist, realist, sentimentalist, stoic, nihilist, naturalist, materialist, pragmatist, impressionist etc….The benign presence of God is totally missing in his major works. In his struggle, the hero finds no support, no help from any divine source, the solace of religion is denied to him. In his moment of extreme pain Nick declares to have made a separate peace, Krebs declares himself to be out of God's Kingdom, Jake Barnes, Frederick Henry, Robert Jordan do not find comfort in God at the time of crisis or suffering."                                                                                                            
Hemingway's works are cynical, his disillusioned characters spend their time drinking, fishing, fighting, and wrenching. These activities are, of course, time-honored diversions of epic and fictional heroes; but in Hemingway they cease to be diversions and become not only goals of existence, but a sort of mystical masculine moral obligation of a lost generation, tough, courageous, and honest, but broken physically and emotionally by the brutality of war and disillusioned by the in sensitivity and hollowness of civilized society.
If we take a critical look at the novels of Hemingway we can clearly find out how the crises of 20th century has influenced his writing on great scale.

In Our Time is a collection of short stories by Hemingway. The title comes from the Common Book of Prayer but the stories reveal that there is "no peace in our time". In this book ministers are shot, lovers are separated, affaires come to an end, murders are committed in short the story deals with everything decent coming to an end.
The Sun Also Rises is a story of a few American expatriates who were living in Paris after the war. They were all wounded either physically or psychologically. The story focuses on how the old pre-war values cannot give them the directions that they are looking for and in this lost world they are all lost souls. All the characters in this story at the end come to realize the limitations of their own existence.

A Farewell To Arms is about the First World War and its epitomizes the whole of the American response to the First World War. It is the novel in which Hemingway has written about the experience of Henry who was a wounded soldier of war, he falls in love with a nurse and in his effort to protect his love he runs away from battle field but at the end the beloved, his child and his carrier all is lost and he is left all alone in the wide world. The Hemingway hero will carry the scars of this fatal accident with his through out his life.  
Novels such as The Sun Also Rises and A Farewell to Arms are populated by men who are, in Hemingway's words, "hurt very badly; in the body, mind, and spirit, and also morally." In these works, World War I casts a shadow over characters who, no longer believing in the traditions and values of the nineteenth century or in the goodness of government, are disillusioned idealists who reject nationalist propaganda and easy sentimentality.  

For Whom The Bell Tolls is about the story of an American volunteer who has been assigned the task of blowing up the bridge in the hills. He falls in love with a girl Maria but at the end of the novel he dies and deserts her. In the novel Hemingway has dealt with the issues as democracy, fascism, human freedom, communism and most importantly the destiny of man.
The Old Man and The Sea is a story of an old man who goes out on a journey to catch a fish . After long struggle for 84 days he ends up catching a fish but on arriving on the port he is left with a skeleton of the fish only. The theme of the story is man's struggle and man's helplessness in the hands of destiny. Death and courage are two of the themes that Hemingway often writes about essentially. Hemingway thinks of courage as a person's ability to be calm and controlled in face of death.  "A man may be destroyed, but not defeated," he declares in The Old Man and The Sea.

Conclusion  
Thus, we can conclude by saying that in Hemingway writing the disturbance, turmoil, restlessness and confusion of the twentieth century is clearly evident. The events left a great impact on the individual as well as the society on the whole, the American literature of that time is enriched with the impressions of those events.

(Article is for academic use only)
Help taken from wikipedia.org and other resources

History of English and American Literature

English 234 - Vanderbilt University Study Aids for Toni Morrison's Jazz - Professor Jay Clayton Fall, 1996 - MWF 9:10-10:00 Calhoun 109

Source: http://www.vanderbilt.edu/AnS/english/Clayton/234jazz.htm

Chronology of Toni Morrison's Jazz

1855  Vera Louise Gray, pregnant, moves to Baltimore; True Belle,
slave, goes with Vera Louise; leaves behind two children, May (age 10)
and Rose (age 8) (142)

1873  Aug.: Golden Gray meets Wild, pregnant w/ Joe (144); Joe Trace
born, Vesper Co., VA (123); raised by           Rhoda and Frank
Williams (123); taught to track by Henry Lestory (Hunters Hunter)

1870-90s  successive waves of northern migration (33)

1876  Violet Trace born (138)

1886  Vienna burned; Joe and Victory wander (174)

1888  Rose Dear loses her house, land, and goods (98, 138); Rocky
Mount hangings; Sept.: True Belle returns a           free woman to
Vesper (138)

1892  Rose Dear's suicide


1893  Joe hunts for his mother, Wild (175-78, cf. 36); marries Violet

1899  True Belle dies (138)

1901  Booker T. Washington eats at the White House; Joe and Violet
evicted from land Joe bought (126)

1906  Joe and Violet take the train to NYC (107)

1917  riots in East St. Louis; Dorcas's parents murdered (57); July:
march in NYC (54, 57, 128)

1919  Feb.: Armistice Day parade (129)

1925  Oct.: Joe meets Dorcas (68) 1926  Jan. 1: Joe shoots Dorcas
(180); Jan. 3: Dorcas's funeral (9); March: Violet visits Alice
Manfred.

HEART OF DARKNESS PRESENTATIONS











20TH CENTURY AMERICAN NOVEL

The turn of the century saw a wide array of events and developments -periods of prosperity and depression, a Great War, transformation in the lives of Black Americans, urban chaos, revolutionary technology, emergence of the "new woman" as protagonist and writer-changed society. But they also changed fiction by deepening the alienation and the fascination writers experienced as they confronted the nation's changing scene. Novelists became more self conscious, self absorbed, and self referential. They changed the novel's regular form for experimental forms of flux, perplexity, openness, skepticism, freedom, and horror. They replaced omniscience with fixed or fallible perspectives, broke their chapters into fragments, and dissolved their sentences into the streams and flows of interior psychic life. Time and space dissolved and the moderns went as far as to question reality itself. Intellectual currents particularly Freudian psychology and Marxism contributed to the breakdown of traditional values. These views fired the imagination of young writers.  

   Modernity favoured "the transient, the fleeting, the contingent", and fascination with these things meant making fiction more dynamic and variable. Faster, fragmentary writing could not only make fiction feel more like itself, but also encourage the sort of nimble thoughts and feelings readers might need to thrive amid modernity's chaotic effects.  

   The writers began to doubt their judgments and their senses, making doubt perhaps the dominant mood of modern fiction. A world constantly in flux was one in which nothing could be certain. It demanded constant recognition of human fallibility and failure.  

   Skepticism often dwells upon the gap between appearances and reality. Modern novelists frequently discover deeply ironic or even ruinous differences between the way things seem and what proves true about them. Appearances reverse realities. Impressions and presuppositions exist to be corrected or defied; truths and realities retreat to story's end, or beyond. To try for truth, modern writers frequently come at it from different perspectives. Another key feature of the modern novel is its sense that truth and meaning vary with point of view. Things appear differently to different people, and the modern novel therefore, tends to vary its perspectives. Sufficient representation demands many tellings, and the full story comes out only as alternative versions present its different sides. Modern novels deal in no absolutes- moral, perceptual, or cultural. Rather, they make truth to be a relative thing, reliant upon circumstances, changing with time and place. 

   Traditional narration conducted with the objective impersonality had come to seem unrealistic, or at least ineffective in conveying the reality of limited human experience and knowledge. By contrast, the subjective narrative, usually aligned with some particular character's point of view, became the only way to achieve narrative credibility. Depending on the temperament of the writer in question or the mood of the story, this stress on subjective experience could be negative or positive. 

   "Consciousness" is the modern novels signature field of play and became fully elaborate in Henry James's psychological novels. Writers bombarded consciousness with sensory impressions of changing objects and scenes that overlapped. Character lost coherence as a result: unified selves fragmented into such a jumble of perceptions, motives, memories, and desires that fictional people ceased to have the fixed, standard "qualities" that had made them engaging and memorable in the novels of the past. Lost within their own mental fluctuation, they ceased strong engagement with the outside world. In modern novel, accurate characterization became a matter of plumbing new depths of idiosyncrasy and confusion; plot turned now on decisions, realizations, and reflections that were more minute and diverse. 

   The early twentieth century novelists tried to make fiction more true to the heterogeneity of human temporality. They also tried to make it more true to the vagaries of human memory. Just as the passing of time had come to seem more irregular, the past had come to seem more elusive, in contrast to what familiar stories and records implied about its easy accessibility. The past therefore, appears in modern novels as something to be discovered only haphazardly, imperfectly, and through much effort. 

   Novelists were determined no longer to preach or to allow the art of fiction to pass into moral argument; they traded ethical priorities for aesthetic ones, and made realism more typical than any preference for good over evil. Moral certainties became unavailable as the ambiguity of human motivation, the relative nature of goodness, and even the savagery of human appetites would have the last word.  

   Even despite the despair and irony that often characterizes modern fiction; it often has an idealistic wish to find new forms of salvation. In some accounts, the modern novel occupies a critical moment of faith in art's powers of redemption. Novelists took aesthetic experiment to new heights, in the hope that doing so could yet reform or redeem culture. 

   Despite outward gaiety, modernity, and unparalleled material prosperity, young Americans of the 1920's were "the lost generation"-so named by the American writer Gertrude Stein. Without a stable, traditional structure of values, the individual lost a sense of identity. The sense of the world still at war, or at least deeply wounded by the war, hovers over the fiction of the twenties. Numerous novels, notably Hemingway's The Sun Also Rises (1926) and Fitzgerald's This Side of Paradise (1920), evoke the extravagance and disillusionment of the lost generation.  

   Vision and viewpoint became an essential aspect of the novel. The way the story was told became as important as the story itself. Henry James, William Faulkner, and many other American writers experimented with fictional points of view. Henry James often restricted the information in the novel to what a single character would have known. Faulkner's novel The Sound and the Fury (1929) breaks up the narrative into four sections, each giving the viewpoint of a different character. 

   The importance of facing reality became a dominant theme in the 1920's and 1930's. Writers such as F. Scott Fitzgerald and the playwright Eugene O'Neill repeatedly portrayed the tragedy awaiting those who live in flimsy dreams.  

   During the 1920's, Harlem, the black community situated in New York City, sparkled with passion and creativity. The sounds of its Black American Jazz swept the United States by a storm. Carl Van Vechten's sympathetic 1926 novel of Harlem gives some idea of the complex and bitter sweet life of black America in the face of economic and social inequality. In the 1930's, novels portrayed concern for the welfare of the common citizen and their focus was on groups of people, professions, families and urban masses. 

   Novels written during World War II reflect little social interest. Americans had turned from domestic problems to a struggle for survival. What most readers wanted was escape-writing. There were novels that attempted to deal with the impact of the war on men so recently civilians, but this fiction is largely autobiographical. 

   In the past, elite culture influenced popular culture through its status and example; the reverse seems true in United States today. Serious novelists such as Alice Walker, Thomas Pynchon, and E.L. Doctorow have borrowed from and commented on comics, movies, fashions, songs, and oral history. Writers have become more innovative and self-aware. Often they find traditional modes ineffective and seek vitality in more widely popular material. Fiction in the second half of the 20th century reflects the character of each decade. The late 1940's saw the aftermath of World War II and the beginning of the Cold War. Writers like Norman Mailer and James Jones employed realism verging on grim naturalism; both took pains not to glorify combat. Later, Joseph Heller cast World War II in satirical and absurdist terms, arguing that war is laced with insanity. In 1940's novelists explored the fate of the individual within the family or community and focused on the balance between personal growth and responsibility to the group. 

   Loneliness was a dominant theme in the 1950's. The faceless corporate man became a cultural stereotype in Sloan Wilson's best-selling novel The Man in the Flannel Suit (1955). General American alienation came under scrutiny of David Riesman in The Lonely Crowd (1950). Most of the works of 1950's supported the assumption that all Americans shared a common lifestyle. They criticized citizens for losing their individualism and becoming too conformist. The 1950's was actually a decade of subtle and pervasive stress. Novels by John O'Hara, John Cheever, and John Updike explore the stress lurking in the shadows of seeming satisfaction. Some of the best work portrays men who fail in the struggles to succeed, as in Arthur Miller's Death of a Salesman. O'Hara wrote about outwardly successful people whose inner faults and dissatisfaction leaves them vulnerable. 

   The alienation and stress underlying the 1950's found outward expression in the 1960's in the Civil Rights Movement, feminism, antiwar protests, and minority activism. The 1960's was marked by a blurring of the line between fiction and fact, novels and reportage that has carried through the present day. An ironic, comic vision also came into view, reflected in the works of several writers. Examples include Ken Kesey's darkly comic One Flew Over the Cuckoo's Nest (1962), a novel about life in a mental hospital in which wardens are more disturbed than the inmates. The comical and fantastic yielded a new mode, half comic and half metaphysical. 

   In the 1980's-the "Me Decade"- ensued, in which individuals tended to focus more on personal concerns than on larger social issues. In literature, old currents remained, but the force behind pure experimentation dwindled. New novelists like John Gardner and Alice Walker surfaced with stylistically brilliant novels to portray moving human dramas. Concern with setting, character, and themes associated with realism returned. Realism was employed often mingled with bold original elements, for example, a daring structure like a novel within a novel. The close of the 1980's and the beginning of 1990s saw minority literature flourish. 

Herman Melville (1819-1891)

   Melville's imagination originates in his powerful sense of the irrationality and contradictoriness of experience. The language and metaphor of Shakespeare make themselves strongly felt in his novel Moby-Dick. The travelogue-novel contributes to the realism employed by the 20th century fiction. In discussing allegory and symbol, Moby-Dick is in one sense a symbolist poem. It also contains strong melodramatic, if not fully tragic elements.  

Mark Twain (1835-1910)

   He is noted for his novels Adventures of Huckleberry Finn (1884), which has been called "The Great American Novel", and The Adventures of Tom Sawyer (1876). Twain wrote about the vanities, hypocrisies and murderous acts of mankind. He combined rich humour, sturdy narrative and social criticism. Twain was a master at rendering colloquial speech and helped to create and popularize a distinctive American literature built on American themes and language. 

F. Scott Fitzgerald (1896-1940)

   Fitzgerald's secure place in American literature rests primarily on his novel The Great Gatsby (1925), a brilliantly written, economically structured story about the American dream of the self-made man. He captured the glittering, desperate life of the 1920's; This Side of Paradise was heralded as the voice of modern American youth. The Beautiful and the Damned (1922) continued his exploration of the self-destructive extravagance of his times. His special style includes a dazzling style perfectly suited to his theme of seductive glamour. 

Ernest Hemingway (1899-1961)

   He is one of the most popular American novelists of this century. His simple style makes his novels easy to comprehend, and they are often set in exotic surroundings. A believer in the "cult of experience", Hemingway often involved his characters in dangerous situations in order to reveal their inner natures. He wrote of war, death and the "lost generation" of cynical survivors. His characters are not dreamers but tough bullfighters, soldiers and athletes. If intellectual, they are deeply scarred and disillusioned. His hallmark is a clean style devoid of unnecessary words. Often he uses understatement. He uses simple words in economical ways. He treats language as a tool and calls attention to new ways of using familiar words. His best novels include The Sun Also Rises, A Farewell to Arms, For Whom the Bell Tolls (1940), and The Old Man and the Sea (1952), a short poetic novel that won him a Pulitzer Prize. 

William Faulkner (1897-1962)

   An innovative writer, Faulkner experimented brilliantly with narrative chronology, different points of view and voices (including those of outcasts, children, and illiterates), and a rich and demanding style built of extremely long sentences full of complicated subordinate parts. The best of his novels include The Sound and the Fury (1929), As I Lay Dying (1930), and Light in August (1932). Most of these novels use different characters to tell parts of the story and demonstrate how meaning resides in the manner of telling, as much as in the subject at hand. Each novel reflects upon itself, while it simultaneously unfolds a story of universal interest. His themes are southern tradition, family, community, the land, history and the past, race, and the passions of ambition and love. He employed Freudian elements in all his works. 

Sinclair Lewis (1885-1951)

   His incisive presentation of American life and his criticism of American materialism, narrowness and hypocrisy brought him national and international recognition. In 1930, He became the first American to win a Nobel Prize for Literature. Lewis's major novels include Babbitt(1922). The novel added a new word to the American language-"babbitry", meaning narrow-minded, complacent, bourgeois ways.  

John Dos Passos (1896-1970)

   Dos Passos wrote more realistically, in line with the doctrine of socialist realism. His best work achieves a scientific objectivism and almost documentary effect. He developed an experimental collage technique for his masterwork U.S.A., consisting of The 42nd Parallel (1930), 1919 (1932), and The Big Money (1936). His techniques included "newsreel" sections taken from cotemporary headlines, popular songs, and advertisements, as well as "biographies" briefly setting forth the lives of important Americans of the period. Both the newsreels and biographies lend Dos Passos's novels a documentary value. A third technique, the "camera eye", consists of stream of consciousness prose poems that offer a subjective response to the events described in the books. 

John Steinbeck (1902-1968)

   Steinbeck is a liberal American writer noted for his social criticism. His best work is the Pulitzer Prize-winning novel The Grapes of Wrath (1939). Other Works include Of Mice and Men (1937), Cannery Row (1945), and East of Eden (1952). Steinbeck combines realism with romanticism that finds virtue in poor farmers who live close to the land. His fiction demonstrates the vulnerability of such people, who can be uprooted by droughts and are the first to suffer in periods of political unrest and economic depression. 

Richard Wright (1908-1960)

   Wright was the first African-American novelist to reach a general audience. His outspoken writing blazed a path for subsequent African –American novelists. His novel Native Son (1940) was a necessary and overdue expression of the racial inequality that has been the subject of so much debate in the United States. 

Norman Mailer (1932- )

   He is generally considered the representative author of recent decades, able to change his style and subject many times. His ideas are bold and innovative. In his appetite for experience, vigorous style, and dramatic public persona, he follows in the tradition of Hemingway. His great works include novels Ancient Evenings (1983) and Harlot's Ghost (1992). 

John Gardner (1933-1982)

   John Gardner used a realistic approach but employed innovative techniques-such as flashbacks, stories within stories, retellings of myths, and contrasting stories- to bring out the truth of a human situation. His strengths are characterization and colorful style. Major works include The Resurrection (1966) and October Light (1976). 

Toni Morrison (1931-)

   An African-America novelist, her richly woven fiction has gained her international acclaim. In compelling, large-spirited novels, she treats the complex identities of black people in a universal manner. 

Alice Walker (1944-)

   A "womanist" writer, as Walker calls herself, she has long been associated with feminism, presenting black existence from the female perspective. She uses heightened lyrical realism to centre on the dreams and failures of accessible, credible people. Her work underscores the quest for dignity in human life. Her work seeks to educate. The Color Purple is one of her finest works.


Contributed by alias used: A nice enough individual, willing to contribute, Sarah Terry M.

FREE SCHOLARSHIP SEARCH

Free scholarship search. Plenty of websites, such as Fastweb, offer free searches for scholarships. There's even a company called Free Scholarship Searches that offers links to 40 websites that provide free scholarship searches. And check out our recent story, "6 tips to pay less for a college degree."

UK AND US UNIVERSITY GRADING CONVERSION SYSTEM - EDUCATION

It IS very problematic for me. because many UK universities just wrote the criteria based on UK degree system and not on GPA system

http://en.wikipedia.org/wiki/British_undergraduate_degree_classification#First-class_honours


So I found a good site which converts them.

GPA out of 4.0

Grade

UK Equivalent

4.0

     A

Good 1st

3.70-3.99

A-

1st – borderline Good 2:1

3.30-3.69

 B+

Good 2:1

3.00- 3.29

     B

Average 2:1

2.70-2.99

B-

Low 2:1 upper 2:2

2.30- 2.69

C+

2:2

2.00- 2.29

    C

Low 2:2

1.70 -1.99

    C-

3rd

1.00 -1.69

D+

 

0

    F

 






















http://offices.exeter.ac.uk/international/staff/Qualifications_Guide/qatar.shtml

Other than that. GO search on facebook communities. that would be of great help to you.

ASK MATH QUESTIONS

http://mathoverflow.net/questions

ask google:
http://www.google.com/search?hl=en&q=ask maths questions
first site:
mathforum.org/dr/math

HUMAN BODY THROUGH SLIDES

http://www.lvntorn.net/13-beautiful-slideshows-to-learn-about-the-human-body.html/

PAYSCALE.COM - LIST OF CAREERS AND THEIR SALARIES

51cnnet.com - FREE BOOKS TO DOWNLOAD

51cnnet.com/directory
A back to top

A Computational Differential Geometry Approach to Grid Generation Second Edition

A Course in Light Speed Reading A Return to Natural Intuitive Reading

A Developer's Guide to SQL Server 2005

A Guide to Matlab Object-oriented Programming

A Laboratory Course in C++ Data Structures, Second Edition

A Practical Guide to Linux Commands, Editors, and Shell Programming

A Practical Guide to Red Hat Linux, Third Edition: Fedora Core and Red Hat Enterprise Linux

A Practical Guide to Testing Object-Oriented Software

A Practical Guide To Video And Audio Compression From Sprockets and Rasters to Macroblocks

A Practical Introduction to to Object-Oriented Design with C++

A Professional's Guide To Data Communication in a TCP/IP World

A Programmer's Guide to Java Certification, A: A Comprehensive Primer, Second

A Programmer's Introduction to C#

A Semantic Web Primer

A+, Network+, Security+ Exams in a Nutshell

About Face 2.0: The Essentials of Interaction Design

Absolute Beginner's Guide To Microsoft Windows Xp, Second Edition

Absolute Beginner's Guide to Upgrading and Fixing Your PC

Absolute Beginner's Guide to Wi-Fi Networking

Absolute BSD—The Ultimate Guide to FreeBSD

Absolute OpenBSD: UNIX for the Practical Paranoid

Accelerated C# 2008

Accelerated C++ Practical Programming by Example

Accelerated DOM Scripting with Ajax, APIs, and Libraries

Accelerated VB 2008

Access 2003 Personal Trainer

Access 2007 for Starters: The Missing Manual

Access 2007: The Missing Manual

Access Database Design and Programming, 3rd Edition

Access Database Design and Programming, Second Edition

Access Forms and Reports for Dummies

Access Hacks

Access VBA Programming

Act! 2007 for Dummies

ActionScript 3.0 Cookbook

ActionScript 3.0 Design Patterns

Actionscript 3.0 Game Programming University

ActionScript for Flash MX: The Definitive Guide, 2nd Edition

Active Directory Cookbook

Active Directory Cookbook, 2nd Edition

Active Directory, 2nd Edition

Adding Ajax

Administering and Securing the Apache Server

Administering Windows Vista Security: The Big Surprises

Administrator's Guide to SQL Server 2005

ADO.NET 3.5 Cookbook, 2nd Edition

ADO.NET in a Nutshell

ADO: ActiveX Data Objects

Adobe After Effects 7.0 Classroom in a Book

Adobe After Effects 7.0 Studio Techniques

Adobe Audition 2.0: Classroom in a Book

Adobe Creative Suite 2 All-in-One Desk Reference For Dummies

Adobe Creative Suite 2 How-Tos: 100 Essential Techniques

Adobe Creative Suite 2 Workflow

Adobe Digital Video How-Tos: 100 Essential Techniques with Adobe Production Studio

Adobe Encore DVD 2.0 Classroom in a Book

Adobe Indesign CS2 How-Tos: 100 Essential Techniques

Adobe Photoshop CS/CS2 Breakthroughs

Adobe Seminars: Web Page Design

Advanced .NET Remoting (C# Edition)

Advanced ActionScript 3 with Design Patterns

Advanced CORBA Programming with C++

Advanced DBA Certification Guide and Reference for DB2 Universal Database v8 for Linux, UNIX, and Windows

Advanced Flash Interface Design

Advanced Linux Networking

Advanced Linux Programming

Advanced Object Oriented Programming with Visual FoxPro 6.0

Advanced Perl Programming, 2nd Edition

Advanced PHP for Web Professionals

Advanced PHP Programming

Advanced Programming in the UNIX Environment: Second Edition

Advanced Rails

Advanced SQL Database Programmers Handbook

Advanced Transact-SQL for SQL Server 2000

Advances in Enterprise Information Technology Security

Agent Intelligence Through Data Mining

Agile Java Crafting Code with Test-Driven Development

Agile Java Development with Spring, Hibernate and Eclipse

Agile Project Management: Creating Innovative Productsd

Agile Retrospectives Making Good Teams Great

Agile Software Development With Scrum

Agile Software Development: The Cooperative Game, Second Edition

Agile Web Development with Rails

Agile Web Development with Rails, 2nd Edition

AIX Reference for Sun Solaris Administrators

AJAX and PHP Building Responsive Web Applications

Ajax and REST Recipes A Problem-Solution Approach

Ajax Design Patterns

Ajax For Dummies

Ajax for Web Application Developers

Ajax Hacks

Ajax in Action

Ajax in Oracle JDeveloper

Ajax on Java

Ajax on Rails

Ajax Patterns and Best Practices

Ajax: Creating Web Pages with Asynchronous JavaScript and XML

Ajax: The Definitive Guide

Alan Simpson's Windows XP Bible

Alan Simpson's Windows Vista Bible, Desktop Edition

Alfresco Enterprise Content Management Implementation

Algorithm Collections for Digital Signal Processing Applications Using Matlab

Algorithms and Data Structures in C++

Algorithms in Java, Third Edition, Part 5: Graph Algorithms

Algorithms in Java: Parts 1-4, Third Edition

Amazon Hacks

Amazon.com Mashups

Ambient Findability

An Introduction to Genetic Algorithms

An Introduction to Network Programming With Java

An Introduction to Programming Using Visual Basic 2005, Sixth Edition

An Introduction to Scientific Computing Twelve Computational Projects Solved with MATLAB

An Introduction to Support Vector Machines and Other Kernel-based Learning Methods

An Introduction to Testing Web Applications with twill and Selenium

Analyzing Receiver Operating Characteristic Curves with SAS

Ant: The Definitive Guide

Anti-Spam ToolKit

Apache Cookbook

Apache Cookbook 2nd Edition

Apache Derby—Off to the Races: Includes Details of IBM Cloudscape

Apache Jakarta-Tomcat

Apache Phrasebook Essential Code and Commands

Apache Security

Apache Server 2 Bible

Apache The Definitive Guide, 3rd Edition

Apache: The Definitive Guide, Second Edition

Apollo for Adobe Flex Developers Pocket Guide

Apple Boot Camp Public Beta First Look

AppleScript in a Nutshell

AppleScriptt: The Comprehensive Guide to Scripting and Automation on Mac OS X, Second Edition

Applied C++: Practical Techniques for Building Better Software

Applied Mathematics for Database Professionals

Applied Microsoft .NET Framework Programming

Applied XML Solutions

Applied XML: A Toolkit for Programmers

Applying Enterprise JavaBeans:Component-Based Development for the J2EE Platform, Second Edition

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development, Third Edition

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process, Second Edition

Architect's Guide to PHP Security

Architecture of Reliable Web Applications Software

Art of Java Web Development STRUTS, TAPESTRY, COMMONS, VELOCITY, JUNIT,AXIS, COCOON, INTERNETBEANS, WEBWORK

ASP.NET 2.0 All-In-One Desk Reference For Dummies

ASP.Net 2.0 Cookbook, 2nd Edition

ASP.NET 2.0 DEMYSTIFIED

ASP.NET 2.0 Everyday Apps For Dummies

ASP.NET 2.0 Illustrated

ASP.NET 2.0 Instant Results

ASP.NET 2.0 MVP Hacks and Tips

ASP.NET 2.0 Revealed

ASP.NET 2.0 Unleashed

ASP.NET 2.0 Website Programming: Problem - Design - Solution

ASP.NET Bible

ASP.NET Cookbook

ASP.NET Database Programming Weekend Crash Course

ASP.NET in a Nutshell

ASP.NET in a Nutshell, 2nd Edition

Aspect-Oriented Analysis and Design : The Theme Approach

Aspect-Oriented Software Development with Use Cases

Assembly Language Step-by-Step: Programming with DOS and Linux, Second Edition

Asterisk: The Future of Telephony

Asterisk: The Future of Telephony, Second Edition

AsteriskNOW A practical guide for deploying and managing an Asterisk-based telephony system using the AsteriskNOW software appliance

Autocad 2005 And Autocad Lt 2005: No Experience Required

AutoCAD 2005 For Dummies

AutoCAD 2007 For Dummies

Autocad and Autocad Lt All-in-one Desk Reference for Dummies

Automating UNIX and Linux Administration


B back to top

Backup And Recovery

BALANCED SCORECARD STEP-BY-STEP Maximizing Performance and Maintaining Results

Baseball Hacks

bash Cookbook

Bash Quick Reference

Bea Weblogic Server 8.1 Unleashed

BEA WebLogic Server Administration Kit

BEA WebLogic Server Bible

Beautiful Code: Leading Programmers Explain How They Think

Beej's Guide to Network Programming Using Internet Sockets

Beginner's Guide to DarkBASIC Game Programming

Beginning Ajax with ASP.NET

Beginning Ajax with PHP: From Novice to Professional

Beginning Algorithms

Beginning Apache Struts: From Novice to Professional

Beginning ASP.NET 2.0 Databases: From Novice to Professional

Beginning ASP.NET 2.0 with C#

Beginning ASP.NET 3.5 in C# 2008 From Novice to Professional, Second Edition

Beginning C# 2008 Databases: From Novice to Professional

Beginning C# 2008: From Novice to Professional

Beginning C# Game Programming

Beginning C# Objects: From Concepts to Code

Beginning C++ Game Programming

Beginning C: From Novice to Professional, Fourth Edition

Beginning Cryptography With Java

Beginning Database Design

Beginning Database Design (Wiley)

Beginning Databases with PostgreSQL: From Novice to Professional, Second Edition

Beginning DotNetNuke 4.0 Website Creation in C# 2005 with Visual Web Developer 2005 Express: From Novice to Professional

Beginning EJB 3 Application Development: From Novice to Professional

Beginning Fedora: From Novice to Professional

Beginning Game Development with Python and Pygame: From Novice to Professional

Beginning Google Maps Applications with PHP and Ajax: From Novice to Professional

Beginning Google Maps Applications with Rails and Ajax From Novice to Professional

Beginning Hibernate: From Novice to Professional

Beginning HTML with CSS and XHTML: Modern Guide and Reference

Beginning Information Cards and CardSpace: From Novice to Professional

Beginning Java 2, SDK 1.4 Edition

Beginning Java Objects: From Concepts to Code, Second Edition

Beginning Java Se 6 Platform: From Novice to Professional

Beginning JavaScript Second Edition

Beginning JavaScript with DOM Scripting and Ajax: From Novice to Professional

Beginning JBoss Seam From Novice to Professional

Beginning Joomla!: From Novice to Professional

Beginning JSP, JSF and Tomcat Web Development From Novice to Professional

Beginning Linux Programming, 2nd Edition

Beginning Linux Programming, 4th Edition

Beginning Linux Programming, Third Edition

Beginning Lua Programming

Beginning Mac OS X Tiger Dashboard Widget Development

Beginning Microsoft Office Live: Build Your Own Web Site Quickly and Easily

Beginning Microsoft Word Business Documents From Novice to Professional

Beginning Object-Oriented Asp.net 2.0 with VB.NET: From Novice to Professional

Beginning Object-Oriented Programming with VB 2005: From Novice to Professional

Beginning Perl for Bioinformatics

Beginning Perl Web Development: From Novice to Professional

Beginning PHP and MySQL 5: From Novice to Professional, Second Edition

Beginning PHP and MySQL: From Novice to Professional, Third Edition

Beginning PHP and Oracle: From Novice to Professional

Beginning PHP and PostgreSQL 8: From Novice to Professional

Beginning PHP And PostgreSQL E-Commerce: From Novice to Professional

Beginning PHP5, Apache, and MySQL Web Development

Beginning Pivot Tables in Excel 2007

Beginning PL/SQL: From Novice to Professional

Beginning POJOs: From Novice to Professional

Beginning Programming with Java For Dummies, 2nd Edition

Beginning Python

Beginning Python: From Novice to Professional

Beginning REALbasic: From Novice to Professional

Beginning Red Hat Linux 9

Beginning Ruby From Novice to Professional

Beginning Ruby on Rails

Beginning Ruby on Rails E-Commerce From Novice to Professional

Beginning SharePoint 2007: Building Team Solutions with MOSS 2007

Beginning Sharepoint With Excel

Beginning Spring 2: From Novice to Professional

Beginning SQL

Beginning SQL Queries: From Novice to Professional

Beginning SQL Server 2005 Express for Developers: From Novice to Professional

Beginning SQL Server 2005 for Developers

Beginning SQL Server 2005 Programming

Beginning SUSE Linux, Second Edition

Beginning SUSE Linux: From Novice to Professional

Beginning Ubuntu Linux, Second Edition

Beginning Ubuntu Linux: From Novice to Professional

Beginning Ubuntu Server Administration: From Novice to Professional

Beginning Unix

Beginning VB 2008 Databases: From Novice to Professional

BEGINNING VISUAL BASIC 2005

Beginning Visual Basic 2005 Express Edition: From Novice to Professional

Beginning Visual C++ 6

Beginning Web Development, Silverlight, and ASP.NET AJAX: From Novice to Professional

Beginning XML Databases

Beginning XML with DOM and Ajax: From Novice to Professional

Behind Closed Doors Secrets of Great Management

Beowulf Cluster Computing with Linux, Second Edition

Best Kept Secrets in .NET

Best of Ruby Quiz Volume One

Better, Faster, Lighter Java

Beyond Java

Beyond the C++ Standard Library: An Introduction to Boost

BIOINFORMATICS A Practical Guide to the Analysis of Genes and Proteins SECOND EDITION

Bioinformatics The Machine Learning Approach

Black Art of Java Game Programming

BlackBerry Enterprise Server for Microsoft Exchange Installation and Administration

BlackBerry For Dummies

BlackBerry Hacks

Blackboard For Dummies

Blink

Blocking Spam and Spyware For Dummies

Blogging: Genius Strategies for Instant Web Content

BLUETOOTH APPLICATION PROGRAMMING WITH THEJAVA APIs ESSENTIALS EDITION

Bluetooth for Java

Botnets The Killer Web APP

BSD Hacks

BSD Sockets Programming from a Multi-Language Perspective

Buffer Overflow Attacks DETECT, EXPLOIT, PREVENT

Build the Ultimate Custom PC

Build Your Own .NET Language and Compiler

Build Your Own AJAX Web Applications

Build Your Own ASP.NET 2.0 Web Site Using C# & VB, Second Edition

Build Your Own Combat Robot

Build Your Own Database-Driven Website Using PHP & MySQL

Build Your Own Ruby on Rails Web Applications

Build Your Own Smart Home

Building a Data Warehouse With Examples in SQL Server

Building a Linux HPC Cluster with xCAT

Building a Monitoring Infrastructure With Nagios

Building a Web 2.0 Portal with ASP.NET 3.5

Building an Optimizing Compiler

Building and Integrating Virtual Private Networks with Openswan

Building Applications with IBM WebSphere Studio and JavaBeans: A Guided Tour

Building Cocoa Applications A Step-by-Step Guide

Building Embedded Linux Systems

Building Expertise: Cognitive Methods for Training and Performance Improvement, Second Edition

Building Firewalls with OpenBSD and PF, Second Edition

Building Flash Web Sites for Dummies

Building Forums with vBulletin Creating and Maintaining Online Discussion Forums

Building Internet Firewalls, Second Edition

Building Java Enterprise Applications Volume I: Architecture

Building Online Communities With Drupal, phpBB, and WordPress

Building Open Source Network Security Tools: Components and Techniques

Building Research Tools With Google For Dummies

Building Scalable and High-Performance Java Web Applications Using J2EE Technology

Building Scalable Web Sites

Building Secure Servers with Linux

Building Tag Clouds in Perl and PHP

Building Telephony Systems with Asterisk

Building the Data Warehouse, Fourth Edition

Building Websites with Joomla! A step by step tutorial to getting your Joomla! CMS website up fast

Bulletproof Web Design: Improving flexibility and protecting against worst-case scenarios with XHTML and CSS

Bulletproof Wireless Security GSM, UMTS, 802.11 and Ad Hoc Security

Business Intelligence for the Enterprise

Business Modeling and Data Mining

Buying a Computer for Dummies, 2006 Edition


C back to top

C # in a Nutshell, 2nd Edition

C Algorithms for Real-Time DSP

C by Example

C for Dummies, 2nd Edition

C in a Nutshell

C Pocket Reference

C Primer Plus, Fifth Edition

C Primer Plus, Fourth Edition

C Primer Plus, Third Edition

C# .NET Web Developer's Guide

C# 2.0 The Complete Reference, Second Edition

C# 2.0: Practical Guide for Programmers

C# 2005 For Dummies

C# 3.0 Cookbook, Third Edition

C# 3.0 Design Patterns

C# 3.0 in a Nutshell, 3rd Edition

C# 3.0 Pocket Reference

C# Bible

C# Cookbook

C# Cookbook, 2nd Edition

C# Developer's Guide to ASP.NET, XML, and ADO.NET

C# For Java Programmers

C# in a Nutshell

C# Language Pocket Reference

C# Network Programming

C# Precisely

C# Primer: A Practical Approach

C# Threading Handbook

C# Your Visual Blueprint For Building .NET Applications

C++ by Dissection

C++ Coding Standards: 101 Rules, Guidelines, and Best Practices

C++ Common Knowledge: Essential Intermediate Programming

C++ Cookbook

C++ Demystified: A Self-Teaching Guide

C++ FAQs, Second Edition

C++ Footprint and Performance Optimization

C++ For Artists: The Art, Philosophy, and Science of Object-Oriented Programming

C++ for Business Programming, Second Edition

C++ for Dummies, 5th Edition

C++ for Mathematicians An Introduction for Students and Professionals

C++ from the Ground Up, Third Edition

C++ Gotchas: Avoiding Common Problems in Coding and Design

C++ GUI Programming with Qt 3

C++ GUI Programming with Qt 4

C++ GUI Programming with Qt4, Second Edition

C++ How to Program, Fifth Edition

C++ in a Nutshell

C++ In Action Industrial Strength Programming Technique

C++ Interactive Course

C++ Network Programming, Volume 1: Mastering Complexity with ACE and Patterns

C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks

C++ Neural Networks and Fuzzy Logic

C++ Plus Data Structures, Third Edition

C++ Primer Plus, Fourth Edition

C++ Primer, Fourth Edition

C++ Primer, Third Edition

C++ Programming for the Absolute Beginner

C++ Standard Library, The: A Tutorial and Reference

C++ Template Metaprogramming: Concepts, Tools, and Techniques from Boost and Beyond

C++ Templates: The Complete Guide

C++ Timesaving Techniques For Dummies

C++ Unleashed

C++ Weekend Crash Course

C++: The Complete Reference

C/C++ Programmer''s Reference, Third Edition

Car PC Hacks

Cascading Style Sheets, 2nd Edition

CCNA Practice Questions Exam Cram, 2nd Edition

CCNP ISCW Portable Command Guide

CCNP ONT Portable Command Guide

CD And DVD Forensics

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

Certified Ethical Hacker Exam Prep

CGI Programming on the World Wide Web

CherryPy Essentials Rapid Python Web Application Development

Cisco Cookbook

Cisco IOS Cookbook, 2nd Edition

Cisco IOS in a Nutshell, 2nd Edition

Cisco Network Security Troubleshooting Handbook

CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition

Citrix MetaFrame For Windows Server 2003: The Official Guide

Classic Shell Scripting

Cleaning Windows XP For Dummies

CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Third Edition

Coaching for Change: Practical Strategies for Transforming Performance

Coaching, Mentoring, and Managing A Coach Guidebook

Cocoa in a Nutshell

Cocoa Programming

Code Complete, Second Edition

Code Craft THE PRACTICE OF WRITING EXCELLENT CODE

Code Reading: The Open Source Perspective

COGNITIVE NETWORKS Towards Self-Aware Networks

Combating Spyware in the Enterprise

Commercial Photoshop Retouching: In the Studio

Commodity Trading Advisors Risk, Performance Analysis, and Selection

Communicating Design: Developing Web Site Documentation for Design and Planning

Complete Home Wireless Networking: Windows XP Edition

Complete Java 2 Certification Study Guide Fifth Edition

Computational Intelligence in Reliability Engineering Evolutionary Techniques in Reliability Analysis and Optimization

Computational Web Intelligence Intelligent Technology for Web Applications

Computer and Communication Networks

Computer Architecture A Quantitative Approach Fourth Edition

Computer Graphics for Java Programmers, Second Edition

Computer Graphics, C Version, 2nd Edition

Computer Security Basics, 2nd Edition

Computer Systems A Programmer's Perspective

Computer Systems Performance Evaluation and Prediction

Computer Viruses and Malware Advances in Information Security

Computers Thinking and Learning Inspiring students with technology

COMPUTING FOR NUMERICAL METHODS USING VISUAL C++

Concepts of Programming Language

CONCRETE MATHEMATICS: A Foundation for Computer Science

Concurrency: State Models and Java Programs, 2nd Edition

Concurrent and Real-Time Programming in Java

Concurrent Programming in Erlang Second Edition

Concurrent Programming in Java: Design Principles and Patterns, Second Edition

Configuration Management Principles and Practice

Configuring and Tuning Databases on the Solaris Platform

Configuring SonicWALL Firewalls

Coniguring IPCop Firewalls Closing Borders with Open Source

Controlling Strategy Management, Accounting,and Performance Measurement

Core C# and .NET

Core C++ A Software Engineering Approach

Core Java 2 Volume II - Advanced Features, Seventh Edition

Core Java 2 Volume I - Fundamentals, Seventh Edition

Core Java Data Objects

Core JavaServer Faces

Core JSP

Core PHP Programming, Third Edition

Core Python Programming

Core Python Programming, Second Edition

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Core Servlets and Javaserver Pages: Volume 1: Core Technologies, 2nd Edition

Core Techniques and Algorithms in Game Programming

Core Web Application Development with PHP and MySQL

Correlated Data Analysis: Modeling, Analytics, and Applications

Cost-Based Oracle Fundamentals

Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

Crackproof Your Software—The Best Ways to Protect Your Software Against Crackers

Create Your Own Digital Photography

Creating Client Extranets with SharePoint 2003

Creating Components: Object Oriented, Concurrent, and Distributed Computing in Java

Creating Cool Web Sites with HTML, XHTML, and CSS

Creating Effective JavaHelp

Creating Family Web Sites For Dummies

Creating Games in C++: A Step-by-Step Guide

Creating Web Pages All-in-One Desk Reference For Dummies, 2nd Edition

Creating Web Pages FOR DUMmIES 7TH EDITION

Creating Web Sites: The Missing Manual

Creating your MySQL Database: Practical Design Tips and Techniques

Crimeware Understanding New Attacks and Defenses

Critical Thinking: Tools for Taking Charge of Your Professional and Personal Life

Cross-Platform Web Services Using C# and Java

Cryptography and Network Security Principles and Practices, Fourth Edition

Cryptography for Dummies

Cryptography in C and C++

Cryptology Unlocked

Crystal Reports 9 on Oracle

Crystal Xcelsius For Dummies

Crytography for Developers

CSS Cookbook

CSS Cookbook 2nd Edition

CSS Hacks and Filters Making Cascading Style Sheets Work

CSS Instant Results

CSS Web Design For Dummies

CSS: The Definitive Guide, 3rd Edition

CSS: The Missing Manual


D back to top

Data Access Patterns: Database Interactions in Object-Oriented Applications

Data Binding with Windows Forms 2.0: Programming Smart Client Data Applications with .NET

Data Entry and Validation With C# and VB .NET Windows Forms

Data Mining Concepts and Techniques

Data Mining Cookbook

Data Mining Practical Machine Learning Tools and Techniques,Second Edition

Data Mining Using Grammar Based Genetic Programming and Applications

Data Mining With Microsoft SQL Server 2000 Technical Reference

Data Mining with SQL Server 2005

Data Strategy

Data Structures and Algorithms in Java

Data Structures And Algorithms in Java 2005

Data Structures for Game Programmers

DATA WAREHOUSING FUNDAMENTALS A Comprehensive Guide for IT Professionals

Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design, Second Edition

Database Design for Smarties: Using UML for Data Modeling

Database Design Manual: using MySQL for Windows

Database in Depth

Database Programming with JDBC and Java, Second Edition

DATABASES AND INFORMATION SYSTEMS IV Selected Papers from the Seventh International Baltic Conference DB&IS'2006

Databases Demystified

Date on Database Writings 2000–2006

DB2 Developer's Guide, Fourth Edition

DB2 II: Performance Monitoring, Tuning and Capacity Planning Guide

DB2 UDB V8 and WebSphere V5: Performance Tuning and Operations Guide

DB2 UDB V8.1 SQL Cookbook

DB2 Universal Database v8 Application Development Certification Guide, 2nd Edition

DB2 Universal Database V8 for Linux, UNIX, and Windows Database Administration Certification Guide 5th Edition

DB2 Universal Database v8 Handbook for Windows, UNIX, and Linux

Debian GNU/Linux Bible

Debugging with GDB The gnu Source-Level Debugger Ninth Edition, for gdb version 20040217

Del.icio.us Mashups

Delphi in a Nutshell

Deploying Cisco Wide Area Application Services

Deploying IPv6 Networks

Deploying Secure 802.11 Wireless Networks With Microsoft Windows

Design And Analysis of Distributed Algorithms

Design Concepts With Code: A Developer Approach

Design Pattern Formalization Techniques

Design Patterns Cd

Design Patterns Elements of Reusable Object-Oriented Software

Design Patterns Explained A New Perspective on Object Oriented Design

Design Patterns ExplainedA New Perspective on Object-Oriented Design Second Edition

Design Patterns in Ruby

Design Patterns Java Workbook

Designer's Guide to MAC OS X Tiger

Designing a Windows Server 2003 Active Directory and Network Infrastructure Exam Cram 2 (Exam 70-297)

Designing and Implementing Linux Firewalls and QoS using netilter, iproute2, NAT, and L7-ilter

Designing BSD Rootkits An Introduction to Kernel Hacking

Designing Components with the C++ STL revised edition

Designing Distributed Environments with Intelligent Software Agents

Designing Effective Database Systems

Designing Embedded Hardware, 2nd Edition

Designing Embedded Hardware, First Edition

Designing Enterprise Solutions with Sun Cluster 3.0

Designing Interfaces

Designing Software Product Lines with UML: From Use Cases to Pattern-Based Software Architectures

Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition

Designing SVG Web Graphics

Designing Web Navigation

Designing Web Services with the J2EE 1.4 Platform JAX-RPC, SOAP, and XML Technologies

Designing with Web Standards

Desktop Applications with Microsoft Visual C++ 6.0 MCSD Training Kit

Developer's Guide To Web Application Security

Developing Enterprise Java applications with J2EE and UML

Developing Feeds with RSS and Atom

Developing Games in Java

Developing Java Beans

Devices of the Soul

DHCP for Windows 2000

Digital Lighting and Rendering, Second Edition

Digital Photography All-in-One Desk Reference For Dummies, 2nd Edition

Digital Photography Hacks

Digital Photography Pocket Guide

Digital Photography: Expert Techniques, 2nd Edition

Digital Photography: The Missing Manual

Digital Video Hacks

Dimensional Data Warehousing With MySQL: A Tutorial

Director in a Nutshell

Disassembling Code: IDA Pro and SoftICE

Discovering Knowledge in Data An Introduction to Data Mining

Distributed .Net Programming in C#

DISTRIBUTED AND PARALLEL SYSTEMS CLUSTER AND GRID COMPUTING

Distributed and Parallel Systems From Cluster to Grid Computing

Dns and Bind Cookbook

DNS and BIND, 4th Edition

DNS and BIND, 5th Edition

DNS in Action A detailed and practical guide to DNS implementation, configuration, and administration

DNS on Windows 2000, 2nd Edition

Dns on Windows Server 2003

DO-IT-YOURSELF ADVERTISING AND PROMOTION

Documenting Oracle Databases Complete Oracle database schema auditing

Documenting Software Architecture

Documenting Software Architectures

Domain-Specific Development with Visual Studio DSL Tools

Don't Get Burned On eBay

Dreamweaver 8 All-in-one Desk Reference for Dummies

Dreamweaver 8 Design and Construction

Dreamweaver 8 For Dummies

Dreamweaver 8: The Missing Manual

Drupal 5 Themes Create a new theme for your Drupal website with a clean layout and powerful CSS styling

Drupal Creating Blogs, Forums, Portals, and Community Websites

Dynamic Enterprise Architecture How to Make It Work

Dynamic HTML: The Definitive Reference, 3rd Edition


E back to top

E-ffective Writing for E-Learning Environments

Easy Ipod And Itunes

Easy Microsoft Windows XP Home Edition, Second Edition

Eating the IT Elephant: Moving from Greenfield Development to Brownfield

Ebay Auction Templates Starter Kit

eBay Hacks

eBay Hacks, 2nd Edition

Eclipse

Eclipse Cookbook

Eclipse: Building Commercial-Quality Plug-ins, Second Edition

Effective awk Programming, Third Edition

Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs

Effective C++: 50 Specific Ways to Improve Your Programs and Design, 2nd Edition

Effective Enterprise Java

Effective Java Programming Language Guide

Effective Oracle Database 10g Security by Design

Effective Perl Programming Writing Better Programs with Perl

Effective Software Testing: 50 Specific Ways to Improve Your Software Testing

Effective STL 50 Specific Ways To Improve Your Use Of The Standard Template Library

Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise

Effective Web Design, Second Edition

Effective XML: 50 Specific Ways to Improve Your XML

Efficient C++ Performance Programming Techniques

Embedded Computing A VLIW Approach to Architecture, Compilers and Tools

Embedded Control Systems in C/C++: An Introduction for Software Developers Using MATLAB

Embedded FreeBSD Cookbook

Embedded Java Security Security for Mobile Devices

Embedded Linux Primer: A Practical, Real-World Approach

Embedded Linux System Design and Development

Emergent Design: The Evolutionary Nature of Professional Software Development

Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange

Encyclopedia Of Data Warehousing And Mining

End-to-End Network Security Defense-in-Depth

Enhancing Microsoft Content Management Server with ASP.NET 2.0

Enterprise AJAX Strategies for Building High Performance Web Applications

Enterprise Development With Visual Studio .NET, UML and MSF

Enterprise Integration with Ruby A Pragmatic Guide

Enterprise J2ME: Developing Mobile Java Applications

Enterprise Java 2 Security:Building Secure and Robust J2EE Applications

Enterprise JavaBeans 2.1

Enterprise JavaBeans, 3rd Edition

Enterprise JavaBeans, 4th Edition

Enterprise JavaBeans,3.0

Enterprise SOA: Service-Oriented Architecture Best Practices

Essential ActionScript 2.0

Essential ActionScript 3.0

Essential ASP.NET With Examples in C#

Essential Business Process Modeling

Essential C# 2.0

Essential C++

Essential Computer Security EVERYONE'S GUIDE TO E-MAIL,INTERNET, AND WIRELESS SECURITY

Essential CVS

Essential CVS, 2nd Edition

Essential MAC OS X Panther Server Administration

Essential PHP Security

Essential Sharepoint

Essential Silverlight

Essential SNMP

Essential SNMP, 2nd Edition

Essential System Administration, 3rd Edition

Essential Windows Presentation Foundation

Essential XML Quick Reference A Programmer's Reference to XML, XPath, XSLT, XML Schema, SOAP, and More

Essentials of Inventory Management

Essentials of Programming Languages second edition

Everyday Scripting with Ruby

ExamInsight for Windows XP Professional Certification: Exam 70-270

Excel 2007 PivotTables Recipes: A Problem-Solution Approach

Excel 2007: The Missing Manual

Excel Advanced Report Development

Excel Hacks

Excel Hacks, Second Edition Tips and Tools for Streamlining Your Spreadsheets

Excel Pivot Tables Recipe Book A Problem-Solution Approach

Excel Programming Weekend Crash Course

Excel Scientific and Engineering Cookbook

Excel Timesaving Techniques For Dummies

Exceptional C++ Style 40 New Engineering Puzzles, Programming Problems, and Solutions

Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions

Exim: The Mail Transfer Agent

Expert .NET Micro Framework

Expert C Programming: Deep C Secrets

Expert C# 2005 Business Objects, Second Edition

Expert MySQL

Expert Oracle

Expert Oracle Database Architecture: 9i and 10g Programming Techniques and Solutions

Expert Oracle JDBC Programming

Expert Oracle9i Database Administration

Expert Service-Oiented Architecture in C# 2005 Second Edition

Expert Spring MVC and Web Flow

Expert SQL Server 2005 Development

Expert SQL Server 2005 Integration Services

Expert VB 2005 Business Objects, Second Edition

Expert Web Services Security in the .NET Platform

Exploiting Software How to Break Code

Exploring the JDS Linux Desktop

Exploring Web Marketing and Project Management

Extending and Embedding PHP

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Extreme Programming Explained : Embrace Change, Second Edition


F back to top

Facebook API Developers Guide

Fast Track to Sun Certified Java Programmer (SCJP) 5.0 Upgrade Exam

Fedora 6 And Red Hat Enterprise Linux Bible

Fedora Linux

Ferret

Fighting Spam for Dummies

File System Forensic Analysis

Filemaker Pro 6 Developer's Guide to XML/XSL

Filemaker Pro 8 for Windows And Macintosh: Visual Quickstart Guide

FINANCIAL BUSINESS INTELLIGENCE Trends, Technology, Software Selection, and Implementation

Financial Instrument Pricing Using C++

Find the Bug A Book of Incorrect Programs

Firefox Hacks

Firewall Fundamentals

Firewall Policies And VPN Configurations

Firewalls 24 Seven, Second Edition

Firewalls for Dummies, 2nd Edition

First Look 2007 Microsoft Office System

Flash 8 ActionScript Bible

Flash 8 Cookbook

Flash 8: Projects for Learning Animation and Interactivity

Flash 8: The Missing Manual

Flash and XML: A Developer's Guide

Flash Hacks

Flash Web Design The Art of Motion Graphics

Flash XML Applications Use AS2 and AS3 to Create Photo Galleries, Menus, and Databases

Flex 3 Cookbook

Flexible Rails FLEX 3 ON RAILS 2

Flickr Hacks

Flickr Mashups

Fonts and Encodings

Forecasting Oracle Performance

Foundation 3Ds Max 8 Architectural Visualization

Foundation ActionScript 3.0 Animation:Making Things Move!

Foundation Actionscript 3.0 with Flash CS3 and Flex

Foundation ActionScript for Flash 8

Foundation Flash Applications for Mobile Devices

Foundation Flash CS3 Video

Foundations of Ajax

Foundations of Algorithms Using C++ Pseudocode, Third Edition

Foundations of ASP.NET AJAX

Foundations of Atlas: Rapid Ajax Development with ASP.NET 2.0

Foundations of BizTalk Server 2006

Foundations of F#

Foundations of Java for ABAP Programmers

Foundations of Microsoft Expression Web The Basics and Beyond

Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering

Foundations of Object-Oriented Languages Types and Semantics

Foundations of Popfly: Rapid Mashup Development

Foundations of Qt Development

Foundations of Security What Every Programmer Needs to Know

Foundations of SQL Server 2005 Business Intelligence

Foundations of Statistical Natural Language Processing

Foundations of WPF

Founders at Work STORIES OF STARTUPS' EARLY DAYS

Free as in Freedom Richard Stallman's Crusade for Free Software

FreeBSD 6 Unleashed

FreeBSD Unleashed

From ASICs to SOCs: A Practical Approach

From Java to C#: A Developer's Guide

From Program to Product TURNING YOUR CODE INTO A SALEABLE PRODUCT

Fundamental Networking in Java

Fundamentals of Computer Organization and Architecture

Fundamentals of OOP and Data Structures in Java

Fundamentals of Relational Database Management Systems: With 312 Figures and 30 Tables

Fundamentals of the New Artificial Intelligence Neural, Evolutionary, Fuzzy and More Second Edition


H back to top

Hack Attacks Testing How to Conduct Your Own Security Audit

Hack I.T.: Security Through Penetration Testing

Hack Proofing Linux : A Guide to Open Source Security

HACK PROOFING Your Web Applications The Only Way to Stop a Hacker Is to Think Like One

Hack Proofing Your Network, Second Edition

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork

Hacker Disassembling Uncovered

Hacker Linux Uncovered

Hacker Web Exploitation Uncovered

Hacker's Delight

Hackers Beware: The Ultimate Guide to Network Security

Hacking del.icio.us

Hacking Exposed Wireless: Wireless Security Secrets and Solutions

Hacking Exposed: Network Security Secrets and Solutions Second Edition

Hacking Firefox:More Than 150 Hacks,Mods, and Customizations

Hacking FOR DUMmIES

Hacking GMail

Hacking Google Maps and Google Earth

Hacking GPS

Hacking Knoppix

Hacking Photoshop CS2

Hacking RSS and Atom

Hacking the Cable Modem: What Cable Companies Don't Want You to Know

Hacking the Code: ASP.NET Web Application Security

Hacking Ubuntu

Hacking Vim A cookbook to get the most out of the latest Vim editor

Hacking Windows XP

Hacking Wireless Networks for Dummies

Hacking: The Art of Exploitation

Hacking: The Art of Exploitation, 2nd Edition

HackNotes Linux and Unix Security Portable Reference

Hacknotes Network Security Portable Reference

Hacknotes Web Security Portable Reference

HackNotes Windows Security Portable Reference

Ham Radio for Dummies

Ham Radio's Technical Culture

Hardcore Java

Hardcore Windows XP: THE STEP-BY-STEP GUIDE TO ULTIMATE PERFORMANCE

Hardening Apache

Hardening Linux

Hardening Linux (2005)

Hardening Windows

Hardening Windows Systems

Hardening Windows, Second Edition

Harnessing Hibernate

Head First C#

Head First Design Patterns

Head First Design Patterns Poster

Head First HTML with CSS and XHTML

Head First Java, 2nd Edition

Head First JavaScript

Head First Object-Oriented Analysis and Design

Head First PMP

Head First Servlets and JSP, Second Edition

Head First Software Development

Head First SQL

Head Rush Ajax

Herb Schildt's Java Programming Cookbook

Hibernate in Action

Hibernate: A Developer's Notebook

High Performance Computing Second Edition

High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI

High Performance MySQL

High Performance MySQL SECOND EDITION

High Performance Web Sites

High-Performance Embedded Computing Architectures, Applications, and Methodologies

Home Network Security Simplified

Home Networking Annoyances

Home Networking Bible, 2nd Edition

Home Networking: The Missing Manual

Home Wireless Networking In A Snap

Honeypots For Windows

Honeypots: Tracking Hackers

How Linux Works: What Every Super-User Should Know

How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986

How to Build an SMS Service

How To Cheat At Managing Windows Small Business Server 2003

How to Cheat at Securing SQL Server 2005

How to Do Everything with PHP and MySQL

How To Do Everything with Your iPOD

How to Think Like a Computer Scientist Learning with Python

How to Wow: Photoshop for the Web

HP-UX 11i Tuning and Performance

Html 4 For Dummies, 5th Edition

HTML and XHTML: The Definitive Guide, 6th Edition

HTML Dog The Best-Practice Guide to XHTML and CSS

HTTP Pocket Reference

HTTP: The Definitive Guide


I back to top

Idea to Image in Photoshop CS2: Rick Sammon's Guide to Enhancing Your Digital Photographs

Illustrated TCP/IP: A Graphic Guide to the Protocol Suite

Image Processing Using Pulse-coupled Neural Networks Second, Revised Edition

ImageMagick Tricks Web Image Effects from the Command Line and PHP

iMovie 6 and iDVD: The Missing Manual

iMovie HD and iDVD 5: The Missing Manual

Imperfect C++ Practical Solutions for Real-Life Programming

Implementing and Administering Security in a Windows Server 2003 Network Exam Cram 2 (Exam 70-299)

Implementing SSH Strategies for Optimizing the Secure Shell

InDesign CS2 for Macintosh and Windows: Visual QuickStart Guide

Indesign Type: Professional Typography with Adobe InDesign CS2

Influence Science and Practice Fourth Edition

Information Architecture for the World Wide Web

Information Dashboard Design

Information Science and Statistics

Inmates Are Running the Asylum, The: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity

Inside C#, Second Edition

Inside Delphi 2006

Inside Java 2 Platform Security: Architecture, API Design, and Implementation, Second Edition

Inside Linux

Inside Microsoft SQL Server 2000

Inside Microsoft SQL Server 2005: T-SQL Programming

Inside Network Perimeter Security

Inside Network Security Assessment: Guarding your IT Infrastructure

Inside SQLite

Inside the C++ Object Model

Inside the Spam Cartel: Trade Secrets From the Dark Side

Inside Windows Server 2003

Insider Power Techniques for Microsoft Windows XP

Instant Messaging in Java The Jabber Protocols

Integrated Approach to Web Performance Testing: A Practitioner's Guide

Integrating Linux and Windows

Integrating PHP and XML

Intel Threading Building Blocks Outfitting C++ for Multi-Core Processor Parallelism

Intelligent Agents for Data Mining and Information Retrieval

Intelligent Information Integration for the Semantic Web

Intermediate Business Programming with C++

Intermediate Perl

Internet Denial of Service: Attack and Defense Mechanisms

INTERNET FIREWALLS AND NETWORK SECURITY, SECOND EDITION

Internet Phone Services Simplified

Introducing Microsoft Windows Vista

Introducing Microsoft LINQ

Introducing Microsoft WinFX: The Application Programming Interface for the Next Generation of Microsoft Windows, Code Name Longhorn

Introducing Windows Server 2008

Introduction to Algorithms, Second Edition

INTRODUCTION TO C++ FOR FINANCIAL ENGINEERS AN OBJECT-ORIENTED APPROACH

Introduction To Computer Security

Introduction to Computing & Programming in Java: A Multimedia Approach

Introduction to Data Mining and Knowledge Discovery Third Edition

Introduction to Parallel Computing, Second Edition

Introduction to Probability With Statistical Applications

Introduction to SQL: Mastering the Relational Database Language, Fourth Edition/20th Anniversary Edition

Intrusion Detection and Prevention

Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Intrusion Prevention Fundamentals

Investment Performance Measurement

Ip Addressing and Subnetting,Including Ipv6

IP in Wireless Networks

IP Storage Networking: Straight to the Core

iPhone Open Application Development

Ipod + Itunes for Windows And MAC in a Snap, Second Edition

iPod and iTunes: The Missing Manual, 2nd Edition

Ipod and Itunes: The Missing Manual, 4th Edition

iPod: The Missing Manual, 5th Edition

IPsec Virtual Private Network Fundamentals

IPSec VPN Design

IPSec: The New Security Standard For The Internet, Intranets, And Virtual Private Networks, 2nd Edition

Ipv6 Essentials, Second Edition

IPv6 in Practice A Unixer's Guide to the Next Generation Internet

Ipv6 Network Administration

IRC Hacks

Ivor Horton's Beginning Java 2, JDK 5 Edition

Ivor Horton's Beginning Visual C++ 2005


J back to top

J2EE Best Practices Java Design Patterns,Automation, and Performance

J2EE Design Patterns

J2ME in a Nutshell

Jakarta Commons Cookbook

Jakarta Struts Cookbook

Java 1.4 Game Programming

Java 1.5 Tiger A Developer's Notebook

Java 2 Developer Exam Cram 2 (Exam CX-310-252A and CX-310-027)

Java 2 Enterprise Edition 1.4 Bible

Java 2 Micro Edition Java in Small Things

Java 2 Platform, Enterprise Edition: Platform and Component Specifications

Java 2 Programmer Exam Cram 2 (Exam CX-310-035)

Java 2D Graphics

Java 3D Programming

Java 6 Platform Revealed

Java After Hours: 10 Projects You'll Never Do at Work

Java and JMX: Building Manageable Systems

Java and SOAP

Java and XML Data Binding

Java and XML, 2nd Edition

Java And Xml, 3rd Edition

Java and XSLT

Java Concurrency in Practice

Java Cookbook

Java Cookbook, 2nd Edition

Java Cryptography

Java Data Access—JDBC, JNDI, and JAXP

Java Data Objects

Java Database Best Practices

Java Database Programming with JDBC

Java Design Patterns: A Tutorial

Java Development on PDAs: Building Applications for PocketPC and Palm Devices

Java Drawing With Apache Batik: A Tutorial

Java EE and .net Interoperability: Integration Strategies, Patterns, and Best Practices

Java Enterprise in a Nutshell

Java Enterprise in a Nutshell, 3rd Edition

Java Examples in a Nutshell, 3rd Edition

Java Extreme Programming Cookbook

Java Foundations

Java Frameworks and Components: Accelerate Your Web Application Development

JAVA GARAGE

Java Generics and Collections

Java How to Program, Sixth Edition

Java I/O, 2nd Edition

JAVA IN A NUTSHELL ,4TH EDITION

Java In A Nutshell, 5th Edition

Java Language Specification, The Third Edition

Java Look and Feel Design Guidelines: Advanced Topics

Java Management Extensions

Java Media APIs Cross-Platform Imaging, Media, and Visualization

Java Message Service

Java Network Programming, 3rd Edition

Java Network Programming, Second Edition

Java NIO

Java Number Cruncher: The Java Programmer's Guide to Numerical Computing

Java Oracle Database Development

Java Performance and Scalability Volume 1: Server-Side Programming Techniques

Java Performance Tuning

Java Performance Tuning, 2nd Edition

Java Persistence with Hibernate REVISED EDITION OF HIBERNATE IN ACTION

Java Phrasebook: Essential Code and Commands

Java Pocket Guide

Java Power Tools

JAVA PROGRAMMING LANGUAGE HANDBOOK

Java Programming on Linux

Java Programming with Oracle JDBC

Java Puzzlers: Traps, Pitfalls, and Corner Cases

Java Reflection in Action

Java Regular Expressions: Taming the java.util.regex Engine

Java RMI

Java Servlet And JSP Cookbook

Java Servlet Programming

Java Servlet Programming, 2nd Edition

Java Studio Creator Field Guide

Java Testing, Design, and Automation

Java Thread Programming

Java Threads, 2nd edition

Java Threads, Third Edition

Java Virtual Machine Online Instruction Reference

Java Web Services

Java Web Services Architecture

Java Web Services in a Nutshell

Java(TM) Data Objects

Java(TM) Look and Feel Design Guidelines (2nd Edition)

Java(TM) Platform Performance: Strategies and Tactics (The Java(TM) Series)

Java(TM) Programming Language,Fourth Edition

Java, Java, Java: Object-Oriented Problem Solving, Third Edition

Java/J2EE Job Interview Companion

JavaScript 2.0: The Complete Reference, Second Edition

JavaScript and DHTML Cookbook

JavaScript and DHTML Cookbook, Second Edition

JavaScript Bible, 5th Edition

JavaScript by Example

JavaScript in 10 Simple Steps or Less

JavaScript Phrasebook: Essential Code and Commands

JavaScript Pocket Reference, 2nd Edition

JavaScript Professional Projects

JavaScript: The Definitive Guide, 5th Edition

JavaScript: The Good Parts

JavaServer Faces

JavaServer Pages

JavaServer Pages Pocket Reference

JavaServer Pages, 2nd Edition

JavaServer Pages, Second Edition

JavaServer Pages,3rd Edition

JBoss Administration and Development Second Edition

JBoss at Work: A Practical Guide

JBoss Seam Simplicity and Power Beyond Java EE

Jboss: A Developer's Notebook

JDBC Metadata, MySQL, and Oracle Recipes: A Problem-Solution Approach

JDK 1.4 Tutorial

Jeff Duntemann's Drive-By Wi-Fi Guide

Joe Celko's Data and Databases: Concepts in Practice

Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL

Joe Celko's Trees and Hierarchies in SQL for Smarties

JSP and XML Integrating XML and Web Services in Your JSP Application

JUnit Recipes Practical Methods for Programmer Testing

JUNOS Enterprise Routing

Just Java 2,Sixth Edition

Jython for Java Programmers


L back to top

LAN Switch Security What Hackers Know About Your Switches

Launching Your Yahoo! Business

LDAP Directories Explained : An Introduction and Analysis

LDAP System Administration

Lean Software Development: An Agile Toolkit

Learn JavaScript In a Weekend

Learn to Program with C++

Learn to Tango with D

Learning ActionScript 3.0

Learning C# 2005

Learning Debian GNU/Linux

Learning Exchange Server 2003

Learning Flash Media Server 3

Learning GNU Emacs, 3rd Edition

Learning Java, 2nd Edition

Learning Java, 3rd Edition

Learning JavaScript

Learning Kernel Classifiers

Learning Oracle PL/SQL

Learning Perl Objects, References and Modules

Learning Perl, 3rd Edition

Learning Perl, 4th Edition

Learning PHP 5

Learning PHP and MySQL

Learning PHP and MySQL, Second Edition

Learning Python

Learning Python, 2nd Edition

Learning Python, Third Edition

Learning Red Hat Enterprise Linux and Fedora, 4th Edition

Learning Red Hat Linux, 3rd Edition

Learning Ruby

Learning SAS by Example A Programmer's Guide

Learning SQL

Learning SQL on SQL Server 2005

Learning the bash Shell, 3rd Edition

Learning the bash Shell, Second Edition

Learning the Korn Shell

Learning the UNIX Operating System Fourth Edition

Learning the vi Editor 6th Edition

Learning the Yahoo! User Interface library

Learning to Program in C++

Learning UML

Learning UML 2.0

Learning Unix for Mac OS X Panther

Learning Website Development with Django

Learning Windows Server 2003

Learning Windows Server 2003, 2nd Edition

Learning with Kernels Support Vector Machines, Regularization, Optimization, and Beyond

Learning XML

Learning XML, 2nd Edition

LEGO MINDSTORMS NXT-G Programming Guide

Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems

LINQ for Visual C# 2005

LINQ Pocket Reference

Linux

Linux All-in-One Desk Reference For Dummies, 2nd Edition

LINUX APPLIANCE DESIGN A Hands-On Guide to Building Linux Appliances

Linux Application Development for the Enterprise

Linux Assembly Language Programming

Linux Bible, 2005 Edition

Linux Bible2006 Edition: Boot Up to Fedora, KNOPPIX, Debian, SUSE, Ubuntu, and 7 Other Distributions

Linux Clustering with CSM and GPFS

Linux Clustering: Building and Maintaining Linux Clusters

Linux Complete Command Reference

Linux Cookbook

Linux Debugging and Performance Tuning: Tips and Techniques

Linux Desk Reference, Second Edition

Linux Desktop Garage

Linux Desktop Hacks

Linux Device Drivers, 2nd Edition

Linux Device Drivers, 3rd Edition

Linux Enterprise Cluster

Linux Firewalls, Third Edition

Linux For Dummies, 6th Edition

Linux for Embedded and Real-time Applications

Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow Guidebook

Linux For Programmers And Users

LINUX IN A NUTSHELL Third Edition

Linux in a Nutshell, 4th Edition

Linux in a Nutshell, 5th Edition

Linux Kernel Development Second Edition

Linux Kernel in a Nutshell

Linux Kernels Internals Second Edition

LINUX NETWORK ADMINISTRATOR'S GUIDE

Linux Network Administrator's Guide, 2nd Edition

Linux Network Administrator's Guide, 3rd Edition

Linux Network Security

Linux Network Servers

Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel

Linux on HP Integrity Servers: A System Administrator's Guide

Linux on the Mainframe

Linux Patch Management: Keeping Linux Systems Up To Date

Linux Power Tools

Linux Programming Bible

Linux Programming Unleashed

Linux Quick Fix Notebook

Linux Security Cookbook

Linux Server Hacks

Linux Server Hacks, Volume Two

Linux Server Security, 2nd Edition

Linux Shell Scripting with Bash

Linux Smart Homes For Dummies

Linux Socket Programming

Linux Socket Programming by Example

Linux System Administration

Linux System Administration, Second Edition

Linux System Programming

Linux Timesaving Techniques For Dummies

Linux Toys II: 9 Cool New Projects for Home,Office, and Entertainment

Linux Transfer for Windows Network Admins: A Roadmap for Building a Linux File and Print Server

Linux Transfer for Windows Power Users: Getting Started with Linux for the Desktop

Linux Troubleshooting Bible

Linux Troubleshooting for System Administrators And Power Users

Linux Unwired

Linux+ Certification Bible

Linux+ Study Guide, Second Edition (Exam XKO-001)

Linux: Phrasebook

Logging In Java with the JDK 1.4 Logging API and Apache log4j

Logic Programming With Prolog

LOGIC, PROGRAMMING AND PROLOG (2ED)

Lotus Notes Domino 8 Upgrader's Guide

LPI Linux Certification in a Nutshell, 2nd Edition

Lucene in Action


M back to top

Mac OS X 10.5 Leopard: Peachpit Learning Series

Mac OS X for Java Geeks

Mac OS X for Unix Geeks

Mac OS X Hacks

Mac OS X in a Nutshell

Mac OS X Leopard

Mac OS X Panther for Unix Geeks

Mac OS X Panther in a Nutshell, 2nd Edition

Mac OS X Power Tools

Mac OS X Tiger for Unix Geeks

MAC OS X Tiger in a Nutshell

Machine Learning

Machine Learning in Computer Vision

Macromedia Captivate for Windows: Visual QuickStart Guide

Macromedia Dreamweaver 8 for Windows And Macintosh: Visual QuickStart Guide

Macromedia Dreamweaver 8 Recipes

Macromedia Fireworks 8: Training from the Source

Macromedia Flash 8 ActionScript: Training from the Source

Macromedia Flash 8 Bible

Macromedia Flash 8 for Windows and Macintosh: Visual Quickstart Guide

Macromedia Flash 8: A Tutorial Guide

Macromedia Flash 8: Training from the Source

Macromedia Flash Professional 8 Unleashed

Macs On The Go!: Guide to Mobile Computing for Mac Laptops Using Mac OS X

MAGIC of NLP DEMYSTIFIED A Pragmatic Guide To Communication and Change

Maintaining Team Performance

Making a Living from Your Ebay Business, Second Edition

Malware: Fighting Malicious Code

Management Of The Object-oriented Development Process

Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 Exam Cram 2 (Exam 70-292)

Managing and Using MySQL, 2nd Edition

Managing Enterprise Systems with the Windows Script Host

Managing Linux Systems with Webmin System Administration and Module Development

Managing NFS and NI, 2nd Edition

Managing Projects with GNU make, 3rd Edition

Managing RAID on Linux

Managing Security With Snort and IDS Tools

Managing Software Development with Trac and Subversion

Managing The Risks Of It Outsourcing

Managing Windows with VBScript and WMI

Managing Your Supply Chain Using Microsoft Navision

Mastering Active Directory for Windows Server 2003

Mastering Algorithms With C

Mastering Digital Photography, Second Edition

Mastering FreeBSD and OpenBSD Security

Mastering Mambo E-Commerce, Templates, Module Development, SEO, Security, and Performance

Mastering MySQL 4

Mastering Oracle SQL

Mastering Oracle SQL and SQL Plus

Mastering Oracle SQL, 2nd Edition

Mastering Perl

Mastering Perl for Bioinformatics

Mastering Perl/Tk

Mastering phpMyAdmin 2.11 for Effective MySQL Management

Mastering phpMyAdmin 2.8 for Effective MySQL Management

Mastering Regular Expressions, 3rd Edition

Mastering Regular Expressions, Second Edition

Mastering Resin

Mastering SQL Server 2005 Reporting Services Infrastructure Design

Mastering Statistical Process Control A Handbook for Performance Improvement Using Cases

Mastering UNIX Shell Scripting

Mastering Web Development with Microsoft Visual Studio 2005

Mavenn: A Developer's Notebook

Maximizing .NET Performance

Maximizing Performance and Scalability with IBM WebSphere

Maximum Linux Security

Maximum Performance: A practical guide to leading and managing people at work

Maximum Security, Fourth Edition

MCAD/MCSD Self-Paced Training Kit: Developing XML Web Services and Server Components with Microsoft Visual Basic .NET and Microsoft C# .NET

MCAD/MCSD: Visual Basic .Net XML Web Services and Server Component Study Guide

MCDST Self-Paced Training Kit (Exam 70-272): Supporting Users and Troubleshooting Desktop Applications on a Microsoft Windows XP Operating System

MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290)

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide

Mcsa/mcse: Windows XP Professional Fast Pass

MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide

MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure: Exam 70-293

MCSE Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure Guide and DVD Training System

MCSE Training Guide (70-293): Planning and Maintaining a Windows Server 2003 Network Infrastructure

MCSE Windows 2000 Professional Exam Cram 2 (Exam 70-210)

MCSE Windows 2000 Server Exam Cram 2 (Exam 70-215)

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) Study Guide and DVD Training System

MCSE: Windows Server 2003 Network Security Design Study Guide (Exam 70-298)

MDA Explained: The Model Driven Architecture: Practice and Promise

Memory Architecture Exploration for Programmable Embedded Systems

MFC Programming with Visual C++ 6 Unleashed

Microformats: Empowering Your Markup for Web 2.0

Microsoft Office Visio 2007 Step by Step

Microsoft Visual C# 2005 Step by Step

Microsoft .NET Remoting

Microsoft AJAX Library Essentials Client-side ASP.NET AJAX 1.0 Explained

Microsoft Exchange Server 2003 Unleashed

Microsoft Forefront Security Administration Guide

Microsoft IIS 6.0: Administrator's Pocket Consultant

Microsoft Internet Security And Acceleration (Isa) Server 2004 Administrator's Pocket Consultant

Microsoft Office 2003 All-In-One

Microsoft Sharepoint Building Office 2007 Solutions in C# 2005

Microsoft Sharepointt: Building Office 2007 Solutions in VB 2005

Microsoft Small Business Server 2003 Unleashed

Microsoft SQL Server 2000 DTS Step by Step

Microsoft SQL Server 2000 High Availability

Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook

Microsoft SQL Server 2000 Reporting Services

Microsoft SQL Server 2000 Unleashed, Second Edition

Microsoft SQL Server 2000: A Guide to Enhancements and New Features

Microsoft SQL Server 2005 Stored Procedure Programming in T-SQL and .NET, Third Edition

Microsoft Visual Basic 2005 Step by Step

MICROSOFT VISUAL C#. NET

Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server 2003, Windows XP, and Windows 2000

Microsoft Windows 2000 Server Administrator's Companion

Microsoft Windows Command-Line Administrator's Pocket Consultant

Microsoft Windows Security Inside Out for Windows XP and Windows 2000

Microsoft Windows Server 2003 Administrator's Pocket Consultant

Microsoft Windows Server 2003 Delta Guide

Microsoft Windows Server 2003 Insider Solutions

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference

Microsoft Windows Server 2003 Terminal Services

Microsoft Windows Shell Script Programming for the Absolute Beginner

Microsoft Windows Vista Unveiled

Microsoft Windows XP Media Center Edition fast and easy

Microsoft Windows XP Professional Administrator's Guide

Microsoft Windows XP: Do Amazing Things!

MIDP Style Guide for the Java 2 Platform, Micro Edition

Migrating to the Solaris Operating System: The Discipline of UNIX-to-UNIX Migrations

Mike Meyers' MCSE Windows Server 2003 Planning a Network Infrastructure Certification Passport (Exam 70-293)

Mind Performance Hacks

Minimal Perl For UNIX and Linux People

Mining eBay Web Services: Building Applications with the eBay API

MINING THE WEB DISCOVERING KNOWLEDGE FROM HYPERTEXT DATA

Mitchell Waite Signature Series: Object-Oriented Design in Java

Mobile Guide to BlackBerry

Model-Driven Testing Using the UML Testing Profile

Modeling and Analysis of Telecommunications Networks

Modeling Structured Finance Cash Flows with Microsoft ExcelA Step-by-Step Guide

Modelling Distributed Systems

Modern C++ Design: Generic Programming and Design Patterns Applied

Modern Operating Systems Second Edition

Modern Software Review Techniques and Technologies

Mongrel: Serving, Deploying, and Extending Your Ruby Applications

More Exceptional C++

More Java Pitfalls 50 New Time-Saving Solutions and Workarounds

More Programming Pearls Confessions of a Coder

Moving from Windows to Linux

Moving to Linux Kiss the Blue Screen of Death Goodbye!

Moving to Linux: Kiss the Blue Screen of Death Goodbye! Second Edition

Moving to Ubuntu Linux

Multithreaded Programming with JAVA Technology

Multitool Linux: Practical Uses for Open Source Software

mySAP Toolbag for Performance Tuning and Stress Testing

MySQL 5.0 Certification Study Guide

MySQL Administrator's Guide

Mysql Administrator's Guide and dLanguage Reference

MySQL and Java Developer's Guide

MySQL and JSP Web Applications: Data-Driven Programming Using Tomcat and MySQL

MySQL and mSQL

MySQL and PHP from Scratch

MySQL Certification Study Guide

MySQL Cookbook

MySQL Cookbook, 2nd Edition

MySQL Crash Course

MySQL Database Design and Tuning

Mysql Enterprise Solutions Alexander "Sasha" Pachev

MySQL in a Nutshell

MySQL in a Nutshell, 2nd Edition

MySQL Phrasebook: Essential Code and Commands

MySQL Pocket Reference

Mysql Pocket Reference SECOND EDITION

MySQL Stored Procedure Programming

MySQL The definitive guide to using, programming, and administering MySQL 4.1 and 5.0 Third Edition

MySQL Tutorial

MySQL, Second Edition

MySQL/PHP Database Applications

MySQL/PHP Database Applications, Second Edition

MySQL: Essential Skills


O back to top

Object Constraint Language, The: Getting Your Models Ready for MDA, Second Edition

Object Design: Roles, Responsibilities, and Collaborations

Object-Oriented Actionscript 3.0

Object-Oriented Analysis and Design With Applications Third Edition

Object-Oriented Analysis And Design With Applications, 2nd Edition

Object-Oriented Design Heuristics

Object-Oriented PHP Concepts, Techniques,and Code

Object-Oriented Programming and Java Second edition

Object-Oriented Programming With Visual Basic.Net

Object-Oriented Programming: From Problem Solving to Java

Object-Oriented System Development:HTML Edition

Objective-C Pocket Reference

Oca: Oracle 10g Administration I Study Guide

OCP: Oracle 10 for Administrators Study Guide

Office 2003 XML

Online Investing Hacks

OOP Demystified: A Self-Teaching Guide

OOP: Building Reusable Components with Microsoft Visual Basic .NET

Open Source for the Enterprise

Open Source Network Administration

Open Source Security Tools: Practical Guide to Security Applications

Open Source Web Development with LAMP: Using Linux, Apache, MySQL, Perl, and PHP

Open Sources 2.0

Open-Source Robotics And Process Control Cookbook Designing and Building Robust,Dependable Real-Time Systems

OpenGL Distilled

OpenGL Programming on MAC OS X

OpenGL Shading Language, Second Edition

OpenGL SUPERBIBLE Fourth Edition Comprehensive Tutorial and Reference

OpenSSH: A Survival Guide for Secure Shell Handling, Version 1.0

Operating System Concepts fifth Edition

Operating Systems Design and Implementation, Third Edition

Operating Systems: Concurrent and Distributed Software Design

Operating Systems: Design and Implementation Second Edition

Optimizing and Testing WLANs Proven Techniques for Maximum Performance

Optimizing C++

Optimizing Linux Performance: A Hands-On Guide to Linux Performance Tools

Optimizing Network Performance with Content Switching: Server, Firewall, and Cache Load Balancing

Optimizing Oracle Performance

Oracle 11i E-Business Suite From the Front Lines

Oracle 9i Fundamentals I Exam Cram 2 (Exam 1Z0-031)

Oracle 9i PL/SQL: A Developer's Guide

Oracle Application Server 10g Administration Handbook

Oracle Application Server 10g Essentials

Oracle Application Server 10g Web Development

Oracle Applications DBA Field Guide

Oracle Data Warehouse Management Secrets of Oracle Data Warehousing

Oracle Data Warehousing and Business Intelligence Solutions

Oracle Database 10g INSIDER SOLUTIONS

Oracle Database 10g New Features

Oracle Database 10g PL/SQL Programming

Oracle Database 10g SQL

Oracle Database 10g XML & SQL: Design, Build, & Manage XML Applications in Java, C, C++, & PL/SQL

Oracle Database 10g: High Availablity with RAC Flashback and Data Guard

Oracle Database 10g: The Complete Reference

Oracle Database 10g:A Beginner's Guide

Oracle Database 11g: New Features for DBAs and Developers

Oracle Database Foundations

Oracle DBA Automation Quick Reference

Oracle DBA Guide to Data Warehousing and Star Schemas

Oracle DBA made simple Oracle database administration techniques

Oracle DBA SQL Quick Reference

Oracle Essentials: Oracle Database 10g, 3rd Edition

Oracle High Performance Tuning for 9i and 10g

Oracle Index Management Secrets Top Oracle Experts Discuss Index Managemen Techniques

Oracle Performance Tuning and Optimization

Oracle Performance Tuning for 10gr2 Second Edition

Oracle Pl/SQL Best Practices

Oracle PL/SQL Best Practices, 2nd Edition

Oracle PL/SQL Built-ins Pocket Reference

Oracle PL/SQL by Example, Third Edition

Oracle PL/SQL for DBAs

Oracle PL/SQL Language Pocket Reference

Oracle PL/SQL Language Pocket Reference, 2nd Edition

Oracle PL/SQL Language Pocket Reference, Fourth Edition

Oracle PL/SQL Programming

Oracle Real Application Clusters

Oracle Regular Expressions Pocket Reference

Oracle RMAN Pocket Reference

Oracle Security

Oracle Space Management Handbook

Oracle SQL Internals Handbook

Oracle SQL Loader: The Definitive Guide

Oracle SQL Plus Pocket Reference, 2nd Edition

Oracle SQL Plus: The Definitive Guide, 2nd Edition

Oracle SQL Tuning Pocket Reference

Oracle to DB2 UDB Conversion Guide

Oracle Wait Interface: A Practical Guide to Performance Diagnostics and Tuning

Oracle XSQL Combining SQL, Oracle Text, XSLT, and Java to Publish Dynamic Web Content

Oracle8i Internal Services for Waits, Latches, Locks, and Memory

Oracle9i DBA JumpStart

Oracle9iR2 Data Warehousing


P back to top

Painless Project Management With Fogbugz, Second Edition

Painting the Web

Palm and Treo Hacks

Panic! UNIX System Crash Dump Analysis

Parallel and Distributed Programming Using C++

Parallel I/O for Cluster Computing

Parallel Scientific Computing in C++ and MPI A seamless approach to parallel algorithms and their implementation

Passive Optical Networks Principles and Practice

Pattern Recognition with Neural Networks in C++

Pattern-Oriented Analysis and Design: Composing Patterns to Design Software Systems

PATTERN-ORIENTED SOFTWARE ARCHITECTURE A Pattern Language for Distributed Computing Volume 4

Pattern-Oriented Software Architecture On Patterns and Pattern Languages Volume 5

Pattern-Oriented Software Architecture Patterns for Resource Management, Volume 3

Patterns for Effective Use Cases The Agile Software Development Series

PayPal Hacks

PC Annoyances, 2nd Edition

PC Hacks: 100 Industrial-Strength Tips and Tools

PC Hardware in a Nutshell, 2nd Edition

PC Hardware in a Nutshell, 3rd Edition

PC Repair and Maintenance: A Practical Guide

PDF Hacks

Pediatric Neurology: Essentials for General Practice: Essentials for General Practice, 1st Edition

Peer-to-Peer with VB .NET

Peopleware Productive Projects and Teams 2nd ed.

Performance Analysis for Java Web Sites

Performance by Design:Computer Capacity Planning By Example

PERFORMANCE TESTING.NET web applications

Performance Tuning and Optimization for Asp.Net Applications

Performance Tuning for Linux Servers

Perl 6 and Parrot Essentials, 2nd Edition

Perl 6 Essentials

Perl and XML

Perl Best Practices

Perl Cookbook, 2nd Edition

Perl Database Programming

Perl Debugged

Perl for Oracle DBAs

Perl for System Administration

Perl Hacks

Perl in a Nutshell, Second Edition

Perl Medic: Transforming Legacy Code

Perl Template Toolkit

Perl Testing: A Developer's Notebook

Perl To Python Migration

Photoreading, 3rd Edition

Photoshop Elements 3: The Missing Manual

Photoshop Elements 4: The Missing Manual

PHP 5 For Dummies

PHP 5 in Practice

PHP 5 Power Programming

PHP 5 Recipes: A Problem-Solution Approach

PHP 5 Unleashed

PHP and MySQL For Dummies, 2nd Edition

PHP and MySQL Web Development

PHP and MySQL Web Development Third Edition

PHP and PostgreSQL: Advanced Web Programming

PHP and Smarty on Large-Scale Web Development

PHP Cookbook

PHP Cookbook, 2nd Edition

PHP Developer's Cookbook, Second Edition

PHP Essentials, Second Edition

PHP Fast and Easy Web Development,2nd Edition

PHP for the World Wide Web: Visual QuickStart Guide

PHP Functions Essential Reference

PHP Game Programming

PHP Hacks

PHP in a Nutshell

PHP Objects, Patterns, and Practice, Second Edition

PHP PHRASEBOOK: ESSENTIAL CODE AND COMMANDS

PHP Pocket Reference, 2nd Edition

PHP Programming with PEAR XML, Data, Dates, Web Services, and Web APIs

PHP Solutions: Dynamic Web Design Made Easy

PHP-Nuke Garage

PHP/MySQL Programming for the Absolute Beginner

PHP5 and MySQL Bible

PHPUnit Pocket Guide

Physical Database Design The Database Professional's Guide to Exploiting Indexes, Views,Storage, and More

Planning and Maintaining a Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-293)

Planning Extreme Programming

Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-296)

PLL Performance, Simulation, and Design 3rd Edition

Plone Fast Track The basics of building a content-management system with Plone

Pocket PC Network Programming

Podcasting and Blogging with GarageBand and iWeb

Podcasting Hacks

Portable DBA: SQL Server

Postfix: The Definitive Guide

PostgreSQL

PostgreSQL 8 for Windows

PostgreSQL Developer's Handbook

Postgresql Essential Reference

PostgreSQL Introduction and Concepts

PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition

PostNuke Content Management

Powerpoint 2007 for Starters: The Missing Manual

PowerPoint 2007: The Missing Manual

Practical .Net 2.0 Networking Projects

Practical Apache Struts 2 Web 2.0 Projects

Practical Business Intelligence with SQL Server 2005

Practical C Programming, 3rd Edition

Practical C++ Programming

Practical C++ Programming, Second Edition

Practical Color Management: Eddie Tapp on Digital Photography

Practical Common Lisp

Practical Development Environments

Practical DWR 2 Projects

Practical Firewalls

Practical FPGA Programming in C

PRACTICAL GENETIC ALGORITHMS SECOND EDITION

Practical J2EE Application Architecture

Practical JBoss Seam Projects

Practical JRuby on Rails Web 2.0 Projects: Bringing Ruby on Rails to Java Platform

Practical Lean Accounting: A Proven System for Measuring and Managing the Lean Enterprise

Practical Linux

Practical mod_perl

Practical MythTV: Building a PVR and Media Center PC

Practical OCaml

Practical PHP and MySQL Building Eight Dynamic Web Applications

Practical PostgreSQL

Practical Programming in Tcl and Tk

Practical Programming in Tcl and Tk, Fourth Edition

Practical Rails Projects

Practical Rails Social Networking Sites

Practical Reporting with Ruby and Rails

Practical REST on Rails 2 Projects

Practical Ruby for System Administration

Practical Ruby Gems

Practical Ruby Projects Ideas for the Eclectic Programmer

Practical Subversion Second Edition

Practical Unix and Internet Security, 3rd Edition

Practical Web 2.0 Applications with PHP

Practical Web Technologies

Practices of an Agile Developer

Pragmatic Ajax A Web2.0 Primer

Pragmatic Project Automation How to Build, Deploy, and Monitor Java Applications

Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional

Pragmatic Unit Testing in C# with NUnit

Pragmatic Unit Testing in C# with NUnit, Second Edition

Pragmatic Unit Testing In Java With Junit

Pragmatic Version Control Using Subversion

Pragmatic Version Control using Subversion 2nd Edition

Pragmatic Version Control with CVS

Prefactoring

Preventative Programming Techniques: Avoid and Correct Common Mistakes

Prioritizing Web Usability

Pro .NET 2.0 Code and Design Standards in C#

Pro .NET 2.0 Extreme Programming

Pro .NET 2.0 Windows Forms and Custom Controls in VB 2005

Pro .NET 2.0 XML

Pro Active Record Databases with Ruby and Rails

Pro Ajax and Java

Pro Apache Struts with Ajax

Pro Apache Tomcat 6

Pro ASP.NET 3.5 in C# 2008, Second Edition

Pro ASP.NET 3.5 Server Controls and AJAX Components

Pro ASP.NET for SQL Server: High Performance Data Access for Web Developers

Pro Biztalk 2006

Pro C# 2008 and the .NET 3.5 Platform, Fourth Edition

Pro C# with .NET 3.0, Special Edition

Pro CSS and HTML Design Patterns

Pro Drupal Development

Pro EDI in BizTalk Server 2006 R2: Electronic Document Interchange Solutions

Pro EJB 3: Java Persistence API

Pro Excel 2007 VBA

Pro Java EE 5 Performance Management and Optimization

Pro Java ME MMAPI: Mobile Media API for Java Micro Edition

Pro JavaScript Design Patterns

Pro JavaScript Techniques

Pro JSF and Ajax: Building Rich Internet Components

Pro LCS: Live Communications Server Administration

Pro LINQ: Language Integrated Query in C# 2008

Pro Microsoft Speech Server 2007: Developing Speech Enabled Applications with .NET

Pro MySQL

Pro Nagios 2.0

Pro Netbeans IDE 6 Rich Client Platform Edition

Pro Open Source Mail: Building an Enterprise Mail Solution

Pro Oracle Database 10g Rac on Linux: Installation, Administration, and Performance

Pro Oracle Spatial for Oracle Database 11g

Pro Paypal E-Commerce

Pro Perl Parsing

Pro PHP Security

Pro PHP: Patterns, Frameworks, Testing and More

Pro SharePoint 2007 Development Techniques

Pro SharePoint Solution Development: Combining .NET, SharePoint, and Office 2007

Pro SMS 2003

Pro SQL Server 2005

Pro SQL Server 2005 Assemblies

Pro SQL Server 2005 Database Design and Optimization

Pro SQL Server 2005 Integration Services

Pro SQL Server 2005 Replication

Pro SQL Server 2005 Service Broker

Pro SQL Server Disaster Recovery

Pro T-SQL 2005 Programmer's Guide

Pro VB 2008 and the .NET 3.5 Platform

Pro Visual Studio 2005 Team System Application Development

Pro VS 2005 Reporting Using SQL Server And Crystal Reports

Pro WCF: Practical Microsoft SOA Implementation

Pro Web 2.0 Application Development with GWT

Pro Web 2.0 Mashups: Remixing Data and Web Services

Pro WF: Windows Workflow in .NET 3.0

Pro Wicket

Pro WPF with VB 2008: Windows Presentation Foundation with .NET 3.5

Pro WPF: Windows Presentation Foundation in .NET 3.0

Processing : Creative Coding and Computational Art

Producing Open Source Software

Professional Adobe Flex 2

Professional Ajax

Professional Ajax, 2nd Edition

Professional Apache Geronimo

Professional Apache Tomcat

Professional Apache Tomcat 6

Professional Assembly Language

Professional C# 2005

Professional DotNetNuke 4.0 Open Source Web Application Framework for ASP.NET 2.0

Professional Jakarta Struts

Professional Java Development with the Spring Framework

Professional Java Tools for Extreme Programming

Professional JavaScript for Web Developers

Professional JMS Programming

Professional LAMP: Linux, Apache, MySQL, and PHP5 Web Development

Professional Linux Programming

Professional Microsoft Smartphone Programming

Professional MOM 2005, SMS 2003, and WSUS

Professional Oracle Programming

Professional Perl Programming

Professional PHP Programming

Professional PHP4

Professional Portal Development with Open Source Tools: Java Portlet API, Lucene, James, Slide

Professional Rootkits

Professional Search Engine Optimization with PHP: A Developer's Guide to SEO

Professional SQL Server 2005 Integration Services

Professional Visual Studio 2005 Team System

Professional Web 2.0 Programming

Professional Web APIs with PHP: eBay, Google, PayPal, Amazon, FedEx, Plus Web Feeds

Professional Windows Workflow Foundation

Professional.NET Framework 2.0

Professional: Software Testing with Visual Studio 2005 Team System

Programming .NET Components

Programming .Net Security

Programming .NET Windows Applications

Programming Amazon Web Services

Programming Applications For Microsoft Windows, 4th Edition

Programming ASP.NET AJAX

Programming Atlas

Programming C#

Programming C# , 2nd Edition

Programming C# 3.0, Fifth Edition

Programming C#, 3rd Edition

Programming C#, 4th Edition

Programming Collective Intelligence

Programming Embedded Systems

Programming Embedded Systems in C and C++

Programming Erlang

Programming Excel With Vba And .net

Programming Firefox

Programming Flash Communication Server

Programming Flex 2

Programming for the Java Virtual Machine

Programming From The Ground Up

Programming In Lua

Programming in Objective-C

Programming in Scala

Programming in the Key of C#

Programming Jakarta Struts

Programming Java 2 Micro Edition for Symbian OS A developer's guide to MIDP 2.0

Programming Lego Mindstorms With Java The Ultmate Tool for Mindstorms Maniacs!

Programming Mac OS X A GUIDE FOR UNIX DEVELOPERS

Programming Microsoft .NET XML Web Services

Programming Microsoft Visual C# 2005: The Language

Programming Microsoft .NET

Programming Microsoft ASP.NET 2.0 Core Reference

Programming Microsoft Visual Basic 2005: The Language

Programming Microsoft Visual C++ 5th Edition

Programming Oracle Triggers and Stored Procedures, Third Edition

Programming Pearls, Second Edition

Programming PHP

Programming PHP, 2nd Edition

Programming Python, 2nd Edition

Programming Python, 3rd Edition

Programming Ruby The Pragmatic Programmers' Guide

Programming Ruby: The Pragmatic Programmer's Guide

Programming SQL Server 2005

Programming the Microsoft Windows Driver Model, 2nd Edition

Programming the Network with Perl

Programming the Perl DBI

Programming WCF Services

Programming Web Services with Perl

Programming Web Services with SOAP

Programming Web Services with XML-RPC

Programming Windows Presentation Foundation

Programming Windows With MFC Second Edition

Programming Wireless Devices with the Java 2 Platform, Micro Edition, Second Edition

Programming With GNU Software

PROGRAMMING WITH MANAGED EXTENSIONS FOR MICROSOFT VISUAL C++.NET

Programming with Microsoft Visual C++ .NET, Sixth Edition

Programming with Objects: A Comparative Presentation of Object-Oriented Programming with C++ and Java

Programming WPF SECOND EDITION

Project 2003 Personal Trainer

Project Leadership

Prototype and Scriptaculous in Action

Prototype and Scriptaculous: Taking the Pain out of JavaScript

PThreads Primer A Guide to Multithreaded Programming

Publish and Prosper: Blogging for Your Business

Pulling Strings with Puppet: Configuration Management Made Easy

Python 2.1 Bible

Python and XML

Python Cookbook, 2nd Edition

Python Essential Reference, Second Edition

Python in a Nutshell

Python in a Nutshell, 2nd Edition

Python Phrasebook: Essential Code and Commands

Python Pocket Reference, 2nd Edition

Python Programming for the Absolute Beginner

Python Programming On Win32

Python Programming with the Java Class Libraries: A Tutorial for Building Web and Enterprise Applications with Jython

Python Scripting for Computational Science Third Edition

Python Standard Library

Python: Visual QuickStart Guide


R back to top

Radar System Performance Modeling Second Edition

Radius

Rails Cookbook

Rails for Java Developers

Rails Plugins: Extending Rails Beyond the Core

Rails Recipes

Rails Solutions: Ruby on Rails Made Easy

RailsSpace Building a Social Networking Website

Rampant TechPress Using the Oracle oradebug Utility Debugging Oracle applications

Rapid Contextual Design A How-to Guide to Key Techniques for User-Centered Design

Rapid Learning in Robotics

Rapid Web Applications with TurboGears: Using Python to Create Ajax-Powered Sites

Raven Scripting Java Builds with Ruby

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real Web Project Management

Real World Aperture

Real World ASP.NET: Building a Content Management System

Real World Linux Security: Intrusion Prevention, Detection, and Recovery

Real World Linux Security: Intrusion Prevention, Detection, and Recovery, Second Edition

Real World Sharpening With Adobe Photoshop CS2: Industrial-Strength Production Techniques

Real World SQL Server Administration with Perl

Real World XML

Real World: Adobe Creative Suite 2

Real-Time and Embedded Computing Systems and Applications 9th International Conference, RTCSA 2003, Tainan City, Taiwan, ROC, February 18-20, 2003, Revised Papers

Reasoning About Knowledge

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Fedora 5 Unleashed

Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies

Red Hat Linux 7.2 Bible, Unlimited Edition

Red Hat Linux 9 Professional Secrets

Red Hat Linux Administration: A Beginner's Guide

Red Hat Linux Bible: Fedora and Enterprise Edition

Red Hat Linux Fedora for Dummies

Red Hat Linux Networking and System Administration

Red Hat Linux Pocket Administrator

Red Hat Linux Security and Optimization

Red Hat: The Complete Reference Enterprise Linux and Fedora Edition

Refactoring Databases: Evolutionary Database Design

Regular Expression Pocket Reference

Regular Expression Pocket Reference, Second Edition

Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al.

Release It! Design and Deploy Production-Ready Software

Repairing and Upgrading Your PC

Research Issues in Systems Analysis and Design, Databases and Software Development

RESTful Web Services

Retro Gaming Hacks

RFID Essentials

RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fifth Edition

RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition

RISK ANALYSIS IN THEORY AND PRACTICE

RJS Templates for Rails

RMAN Recipes for Oracle Database 11g A Problem-Solution Approach

Rootkits: Subverting the Windows Kernel

Routing TCP/IP, Volume II (CCIE Professional Development)

RSS and Atom in Action WEB 2.0 BUILDING BLOCKS

RT Essentials

Ruby by Example Concepts and Code

Ruby Cookbook

Ruby Developer's Guide

Ruby for Rails

Ruby In A Nutshell

Ruby on Rails Enterprise Application Development: Plan, Program, Extend

Ruby on Rails For Dummies

Ruby on Rails for PHP and Java Developers

Ruby on Rails: Up and Running

Ruby Pocket Reference

Rubyisms in Rails

Run Your Own Web Server Using Linux and Apache

Running Linux, 4th Edition

Running Linux, 5th Edition

Running MS-DOS Version 6.22, 20th Anniversary Edition


S back to top

S60 Programming A Tutorial Guide

Samba-3 by Example: Practical Exercises to Successful Deployment, Second Edition

Sams Teach Yourself AJAX in 10 Minutes

Sams Teach Yourself ASP.NET 2.0 in 24 Hours

Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days

Sams Teach Yourself Database Programming with Visual C++ 6 in 21 Days

Sams Teach Yourself HTML and CSS in 24 Hours, SEVENTH EDITION

Sams Teach Yourself HTML in 10 Minutes, Fourth Edition

Sams Teach Yourself Java 6 in 21 Days

Sams Teach Yourself JavaServer Pages 2.0 with Apache Tomcat in 24 Hours

SAMS Teach Yourself Macromedia Dreamweaver 8 in 24 Hours

Sams Teach Yourself Macromedia Flash 8 in 24 Hours

Sams Teach Yourself Microsoft Office 2003 in 24 Hours

Sams Teach Yourself Microsoft Office Outlook 2003 in 24 Hours

Sams Teach Yourself Microsoft Visual C# .Net 2003 in 24 Hours

Sams Teach Yourself MySQL in 10 Minutes

Sams Teach Yourself Php In 10 Minutes

Sams Teach Yourself PHP in 24 Hours,Third Edition

Sams Teach Yourself PHP, MySQL and Apache All in One

Sams Teach Yourself PHP, MySQL and Apache in 24 Hours

Sams Teach Yourself PHP, MySQL And Apache: All in One, Third Edition

SAMS Teach Yourself Programming with Java in 24 Hours, FOURTH EDITION

Sams Teach Yourself Regular Expressions in 10 Minutes

Sams Teach Yourself Shell Programming in 24 Hours

Sams Teach Yourself SQL in 10 Minutes, Third Edition

Sams Teach Yourself SQL in 24 Hours, Third Edition

Sams Teach Yourself Tcp/Ip in 24 Hours,Third Edition

Sams Teach Yourself Unix In 10 Minutes

Sams Teach Yourself Visual C# 2005 in 24 Hours, Complete Starter Kit

Sams Teach Yourself XML in 21 Days, Third Edition

Sams Teach Yourself: Web Publishing with HTML and CSS in One Hour a Day

SAP on DB2 for z/OS and OS/390: High Availability and Performance Monitoring with Data Sharing

Sas 9.1 Companion For Unix Enivronments

SAS Macro Programming Made Easy, Second Edition

Scalable Internet Architectures

Scheduling Algorithms Fifth Edition

SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055)

ScreenOS Cookbook

Search Engine Advertising: Buying Your Way to the Top to Increase Sales

Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Web Site

Search Engine Optimization

Search Engine Optimization An Hour a Day

Search Engine Optimization for Dummies, 2nd Edition

Secrets of RSS

Secrets of Video Blogging

Secure PHP Developmentt: Building 50 Practical Applications

Secure Programming Cookbook for C and C++

Secure XML: The New Syntax for Signatures and Encryption

Securing Ajax Applications

Securing and Optimizing Linux: RedHat Edition

Securing and Optimizing Linux: The Hacking Solution

Securing Linux: A Survival Guide for Linux Security, Version 1.0

Securing the Information Infrastructure

Securing Windows Server 2003

Security and Usability

Security for Microsoft Visual Basic .NET

Security in Computing, Fourth Edition

Security in Distributed, Grid, Mobile, And Pervasive Computing

Security Power Tools

Security Warrior

sed and awk (2nd Edition)

Self-defending Networks: The Next Generation of Network Security

Self-Service Linux: Mastering the Art of Problem Determination

Selinux

SELinux by Example: Using Security Enhanced Linux

sendmail 8.13 Companion

sendmail Cookbook

sendmail Desktop Reference

Sendmail Milters A Guide for Fighting Spam

Sendmail Performance Tuning

sendmail, Fourth Edition

sendmail,3rd Edition

SEO Search Engine Optimization Bible

Sequence Analysis in a Nutshell

Server Load Balancing

Servlets and JavaServer Pages: The J2EE Technology Web Tier

Setting Up LAMP: Getting Linux, Apache, MySQL, and PHP Working Together

SharePoint 2007 User's Guide: Learning Microsoft's Collaboration and Productivity Platform

Shell Scripting Recipes: A Problem-Solution Approach

Shellcoder Programming Uncovered

Show Me Microsoft Windows XP

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silverlight and ASP.NET Revealed

Simply JavaScript

Site-Seeing—A Visual Approach To Web Usability

Skinning Windows XP

Skype Hacks: Tips and Tools For Cheap Calls From Your Computer

Skype: The Definitive Guide

Slamming Spam: A Guide for System Administrators

Small Form Factor PCs

Smartphone Operating System Concepts with Symbian OS A Tutorial Guide

SNA and.TCP/IP Integration Handbook

Snort 2.0 Intrusion Detection

Snort 2.1 Intrusion Detection Second Edition

Snort Cookbook

SOA in Practice

Software Architect Bootcamp

Software Architecture Design Patterns in Java

Software Configuration Management Patterns: Effective Teamwork, Practical Integration

Software Defined Radio The Software Communications Architecture

Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code

Software Project Management in Practice

Software Testing and Analysis: Process, Principles and Techniques

Software Testing Fundamentals: Methods and Metrics

Software Testing Techniques, Second Edition

Solaris 10 System Administration Exam Prep

Solaris 10: The Complete Reference

Solaris 8 System Administrator Exam Cram SUN CERTIFIED SYSTEM ADMINISTRATOR

SOLARIS 8 TRAINING GUIDE (310-011 AND 310-012): SYSTEM ADMINISTRATOR CERTIFICATION

Solaris 9 Network Administrator Exam Cram 2 (Exam CX-310-044)

Solaris 9: Sun Certified System Administrator Study Guide

Solaris Internals: Solaris 10 and OpenSolaris Kernel Architecture, Second Edition

Solaris Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris

Solaris Security

Space-Time Coding THEORY AND PRACTICE

SpamAssassin

Spatial Data on the Web Modeling and Management

Special Edition Using Enterprise JavaBeans 2.0

Special Edition Using Filemaker 8

Special Edition Using Java 2 Standard Edition

Special Edition Using XML Schema

Spidering Hacks: 100 Industrial-Strength Tips and Tools

Spring in Action

Spring in Action Second Edition

Spring: A Developer's Notebook

SQL Bible

SQL Cookbook

SQL Hacks

SQL in a Nutshell A Desktop Quick Reference

Sql In A Nutshell, 2nd Edition

SQL Performance Tuning

SQL Server 2000 Fast Answers for DBAs And Developers

SQL Server 2000 for Experienced DBAs

SQL Server 2000 Stored Procedure and XML Programming, Second Edition

SQL Server 2000 Stored Procedures Handbook

SQL Server 2005 Bible

SQL Server 2005 Reporting Essentials

SQL Server Security Distilled, Second Edition

SQL Tuning

SQL: Practical Guide for Developers

SQLite

Squid: The Definitive Guide

SSH, the Secure Shell The Definitive Guide

SSH, the Secure Shell, 2nd Edition

Standards of Practice Handbook, NINTH EDITION

Statistics Hacks

Steal This Computer Book 3: What They Won't Tell You About the Internet

Steal This File Sharing Book: What They Won't Tell You About File Sharing

Stealing the Network: How to Own a Continent

Step into Xcode Mac OS X Development

Stl Tutorial and Reference Guide: C++ Programming With the Standard Template Library

Stopping Spyware

Structure and Interpretation of Computer Programs Second Edition

Structured Finance Modeling With Object-Oriented VBA

Stylin' with CSS: A Designer's Guide

Succeeding at Your Yahoo! Business

Succeeding with Open Source

Sun Certified Enterprise Architect for J2EE Study Guide (Exam 310-051)

Sun Certified Security Administrator For Solaris 9 and 10 Study Guide

Sun Certified Solaris 9.0 System and Network Administrator All-in-One Exam Guide

Sun Certified System Administrator for Solaris 10 Study Guide (Exams CX-310-200 and CX-310-202)

Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers

Sun Performance and Tuning - SPARC & Solaris

Survey of Text Mining Clustering, Classification, and Retrieval Scanned by Velocity

Suse Linux

SUSE Linux 10 Unleashed

SUSE LINUX Enterprise Server 9 Administrator's Handbook

Swing Hacks: Tips and Tools For Killer GUIs

Switching to the Mac: The Missing Manual, Leopard Edition

Switching to the Mac: The Missing Manual, Tiger Edition

Symbian OS Internals Real-time Kernel Programming

Syndicating Web Sites with RSS Feeds For Dummies

System Performance Tuning, Second Edition


T back to top

Taking Your iPhone to the Max

Tcl and the Tk Toolkit

TCP/IP Foundations

TCP/IP Illustrated, Volume 1 The Protocols

TCP/IP Illustrated, Volume 2: The Implementation

TCP/IP Network Administration, 3rd Edition

Teamwork from the Inside Out Fieldbook: Exercises and Tools for Turning Team Performance Inside Out

Technical Java: Developing Scientific and Engineering Applications

Techniques for Optimizing Applications: High Performance Computing

Telecom for Dummies

Ten Ton Dreamweaver

Terminal Services for Microsoft Windows Server 2003: Advanced Technical Design Guide

Test Driven Development: A J2EE Example

Test Driven PRACTICAL TDD AND ACCEPTANCE TDD FOR JAVA DEVELOPERS

Test-Driven Development By Example

Test-Driven Development in Microsoft .NET

Text Processing in Python

TextMate Power Editing for the Mac

The C Programming Language

The .NET Developer's Guide to Windows Security

The 30-Second Encyclopedia of Learning and Performance: A Trainer's Guide to Theory, Terminology, and Practice

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

The Alarm, Sensor, and Security Circuit Cookbook

The Apache Modules Book Application Development with Apache

The Art of Computer Virus Research and Defense

The Art of Assembly Language

The Art of C++

The Art of ClearCase Deployment The Secrets to Successful Implementation

THE ART OF COMPUTER PROGRAMMING SECOND EDITION

The Art of Computer Programming, Volume 3

The Art of Project Management

The Art of Software Architecture: Design Methods and Techniques

The Art of Software Modeling

The Art of Software Testing, Second Edition

The Art of SQL

The Art of UNIX Programming

The Berkeley DB Book

The BlackBerry Pearl Pocket Guide, 1/e

The Book of Overclocking: Tweak Your PC to Unleash Its Power

The Book of Postfix

The C# Programming Language

The C++ Programming Language Third Edition

The Complete E-Commerce Book: Design, Build, and Maintain a Successful Web-based Business, Second Edition

The Complete FreeBSD, Fourth Edition

The Craft of System Security

The CSS Anthology: 101 Essential Tips, Tricks and Hacks

The Dam Book: Digital Asset Management for Photographers

The Database Hacker's Handbook: Defending Database Servers

THE DEBIAN SYSTEM

The Definitive Guide to Apache mod_rewrite

The Definitive Guide to Berkeley DB XML

The Definitive Guide to Django Web Development Done Right

The Definitive Guide to Grails

The Definitive Guide to iReport

The Definitive Guide to JasperReports

The Definitive Guide to MySQL 5, Third Edition

The Definitive Guide to MySQL, Second Edition

The Definitive Guide to Plone

The Definitive Guide to Samba 3

The Definitive Guide to SOA: BEA AquaLogic Service Bus

The Definitive Guide to SQLite

The Definitive Guide to Symfony

The Definitive Guide to the Microsoft Enterprise Library

The Definitive Guide to the Xen Hypervisor

The Definitive Guide to Windows Installer

The Design and Implementation of the 4.4 BSD Operating System

The Design and Implementation of the FreeBSD Operating System

The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience

The Definitive ANTLR Reference Building Domain-Specific Languages

The Digital SLR Guide: Beyond Point-and-Shoot Digital Photography

The Essence of object-oriented programming with Java and UML

The Essential Guide to Flex 2 with ActionScript 3.0

The Essentials of Computer Organization and Architecture

The Evelyn Wood Seven-Day Speed Reading and Learning Program

The FreeBSD Corporate Networker's Guide

The Frontiers of Project Management Research

The Guru's Guide to SQL Server Architecture and Internals

The Handbook of Brain Theory and Neural Networks Second Edition

The Hidden Power of Flash Components

The Internet: The Missing Manual

The Java EE 5 Tutorial, Third Edition: For Sun Java System Application Server Platform Edition 9

The Java Native Interface Programmer's Guide and Specification

The Java Tutorial Fourth Edition: A Short Course on the Basics

The Java Tutorial, Third Edition: A Short Course on the Basics

The JavaScript Anthology: 101 Essential Tips, Tricks & Hacks

The Korn Shell: Unix and Linux Programming Manual, Third Edition

The Korn Shell: User and Programming Manual

The Linux Cookbook: Tips and Techniques for Everyday Use

The Linux Kernel Module Programming Guide

The Linux Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures

The Linux Process Manager The internals of scheduling, interrupts and signals

The Microsoft Data Warehouse Toolkit : With SQL Server 2005 and the Microsoft Business Intelligence Toolset

The Microsoft Expression Web Developer's Guide to ASP.NET 3.5: Learn to create ASP.NET applications using Visual Web Developer 2008

The Mythical Man-Month

The Myths of Innovation

The New Language of Business SOA & Web 2.0

The Object Primer, Third Edition

The Object-Oriented Thought Process, Second Edition

The Official Samba-3 HOWTO and Reference Guide, Second Edition

The Official Ubuntu Book

The OpenBSD 4.0 Crash Course

The Oracle Hacker's Handbook: Hacking and Defending Oracle

The Photoshop Anthology

The PHP Anthology, Volume II: Applications

The Practice of Network Security: Deployment Strategies for Production Environments

The Practice of Programming

The Pragmatic Programmer: From Joumeyman to Master

The Principles of Web Design

The Programmer's Guide to SQL

The qmail Handbook

The Rails Way

The Relational Database Dictionary

The Ruby Programming Language

The Ruby Way

The Ruby Way: Solutions and Techniques in Ruby Programming, Second Edition

The Scheme Programming Language, Third Edition

The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management

The Shellcoder's Handbook: Discovering and Exploiting Security

The Tao of Network Security Monitoring:Beyond Intrusion Detection

The The Concise Guide to Dns and Bind

The Ultimate Windows Server 2003 System Administrator's Guide

The UNIX-HATERS Handbook

The Web Application Hacker's Handbook Discovering and Exploiting Security Flaws

THE WEB CONFERENCING BOOK

The XML Schema Complete Reference

Thinking Forth A Language and Philosophy for Solving Problems

Thinking in C#

Thinking in C++, 2nd ed. Volume 1

Thinking in Java Fourth Edition

Thinking in Java, Third Edition

Time Management for System Administrators

TiVo Hacks 100 Industrial-Strength Tips and Tools

TOAD Handbook

Tomcat: The Definitive Guide

Tomcat: The Definitive Guide, Second Edition

Transact-SQL Cookbook

Troubleshooting Linux Firewalls

Tuning and Customizing a Linux System

Tuning Third-party Vendor Oracle systems Tuning when you can't touch the code

Twisted Network Programming Essentials

Types and Programming Languages


U back to top

Ubuntu Hacks

Ubuntu Linux for Non-Geeks A Pain-Free, Project-Based, Get-Things-Done Guidebook

Ubuntu Unleashed

UML 2.0 in a Nutshell

UML Distilled Second Edition A Brief Guide to the Standard Object Modeling Language, Second Edition

Understanding .NET, Second Edition

Understanding AJAX: Using JavaScript to Create Rich Internet Applications

Understanding and Deploying LDAP Directory Services

Understanding and Deploying LDAP Directory Services, Second Edition

Understanding Ipv6

Understanding Linux Network Internals

Understanding MySQL Internals

Understanding Open Source and Free Software Licensing

Understanding the Linux Kernel

Understanding the Linux Kernel, 2nd Edition

Understanding the Linux Kernel, 3rd Edition

Unicode Explained

Unit Test Frameworks

UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management

Unix Backup and Recovery

UNIX Fault Management: A Guide for System Administration

UNIX Filesystems: Evolution, Design, and Implementation (VERITAS Series)

UNIX For Dummies, 5th Edition

UNIX for MAC OS X 10.4 Tiger: Visual QuickPro Guide

UNIX for Mac: Your visual blueprint to maximizing the foundation of Mac OS X

UNIX for OpenVMS Users, Third Edition

Unix for Oracle DBAs Pocket Reference

UNIX Hints and Hacks

Unix in a Nutshell 3rd Edition

Unix in a Nutshell, 4th Edition

UNIX Network Programming Volume 1, Third Edition: The Sockets Networking API

UNIX Power Tools, 3rd Edition

Unix Shell Programming, Third Edition

UNIX Shells by Example Fourth Edition

UNIX Shells by Example, Third Edition

UNIX System Administration: A Beginner's Guide

Unix Systems Programming: Communication, Concurrency, and Threads

Unix Third Edition: Visual Quickstart Guide

Unix to Linux Porting: A Comprehensive Reference

UNIX User's Handbook, Second Edition

Unix: The Complete Reference, Second Edition

Unleashing Web 2.0 From Concepts to Creativity

Unlocking Microsoft C# v2.0 Programming Secrets

Upgrading And Repairing Laptops, Second Edition

Upgrading And Repairing Networks, Fifth Edition

Upgrading and Repairing Networks, Fourth Edition

Upgrading and Repairing PCs, 17th Edition

Upgrading and Repairing Servers

Upgrading to PHP 5

Use Case Driven Object Modeling with UML: Theory and Practice

Use ClickOnce to Deploy Windows Applications

User Interface Design for Mere Mortals

User Mode Linux

User Stories Applied: For Agile Software Development

Using and Understanding Java Data Objects

Using Google Spreadsheets

Using Oracle SQL Stored Outlines and Optimizer Plan Stability

Using Samba, 3rd Edition

Using Samba,2nd Edition

Using XML with Legacy Business Applications


W back to top

Waite Group's Object-Oriented Programming in C++, Third Edition

Web 2.0 Principles and Best Practices

Web 2.0: A Strategy Guide

Web Analytics An Hour a Day

Web Application Architecture Principles, protocols and practices

Web Application Development With Php 4.0

Web Caching

Web Caching and Replication

Web Client Programming with Perl Automating Tasks on the Web

Web Component Development With Zope 3

Web Data Management Practices: Emerging Techniques and Technologies

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

Web Database Applications with PHP & MySQL

Web Database Applications with PHP & MySQL, 2nd Edition

Web Design and Marketing Solutions for Business Websites

Web Design in a Nutshell A Desktop Quick Reference

Web Design in a Nutshell, 3rd Edition

Web Hacking: Attacks and Defense

Web Mapping Illustrated

Web Performance Tuning

Web Portfolio Design and Applications

Web Search Garage

Web Security and Commerce

Web Security Basics

Web Security, Privacy and Commerce, 2nd Edition

Web Services on Rails

Web Services Security

Web Site Cookbook

Web Site Measurement Hacks

WebLogic Server 6.1 Workbook Enterprise JavaBeans 3rd Edition

WebLogic: The Definitive Guide

Wi-fi Hotspots

Wi-Fi Toys: 15 Cool Wireless Projects for Home,Office, and Entertainment

Wi-Foo

Wicked Cool Java

Wicked Cool Perl Scripts Useful Perl Scripts That Solve Difficult Problems

Wicked Cool PHP

Wicked Cool Shell Scripts: 101 Scripts for Linux, Mac OS X, and Unix Systems

Wimax Standards and Security

WiMAX Technologies,Performance Analysis,and QoS

Windows .NET Server 2003 Domains and Active Directory

Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)

Windows 2000 Commands Pocket

Windows 2000 Network Infrastructure Exam Cram 2 (Exam 70-216)

Windows Admin Scripting Little Black Book, Second Edition

Windows Administration at the Command Line for Windows 2003, Windows Xp, And Windows 2000

Windows Developer Power Tools

Windows Forensics and Incident Recovery

Windows Forms 2.0 Programming

Windows Forms Programming in C#

Windows Forms Programming in Visual Basic .NET

Windows Home Server User's Guide

Windows Media 9 Series by Example

Windows NT File System Internals

Windows PowerShell Cookbook

Windows PowerShell in Action

Windows Server 2003 Active Directory Infrastructure Exam Cram 2 (Exam 70-294)

Windows Server 2003 Bible, R2 and SP1 Edition

Windows Server 2003 Clustering and Load Balancing

Windows Server 2003 for Dummies

Windows Server 2003 in a Nutshell

Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-291)

Windows Server 2003 Registry

Windows Server 2003 Security Infrastructures

Windows Server 2003 Weekend Crash Course

Windows Server 2003: The Complete Reference

Windows Server 2008: The Definitive Guide

Windows Server Cookbook

Windows Server Hacks

Windows System Programming Third Edition

Windows Vista Administration: The Definitive Guide

Windows Vista Administrator's Pocket Consultant

Windows Vista Annoyances

Windows Vista for Starters: The Missing Manual

Windows Vista in a Nutshell

Windows Vista Plain and Simple

Windows Vista Pocket Reference

Windows Vista: Beyond the Manual

Windows Vista: The Missing Manual

Windows XP All-in-One Desk Reference For Dummies, 2nd Edition

Windows XP and Office 2003 Keyboard Shortcuts

Windows XP For Dummies Quick Reference, 2nd Edition

Windows XP for Power Users: Power Pack

Windows XP GigaBook For Dummies

Windows XP Hacks

Windows XP Hacks, 2nd Edition

Windows XP Pocket Reference

Windows XP Pro: The Missing Manual

Windows Xp Timesaving Techniques For Dummies, 2nd Edition

Windows XP Unwired

Winternals Defragmentation, Recovery, and Administration Field Guide

Wireless Hacks

Wireless Home Networking For Dummies

Wireless Java Developing with J2ME, Second Edition

Wireless Security Handbook

Wireshark and Ethereal Network Protocol Analyzer Toolkit

Word 2007: Beyond the Manual

Word 2007: The Missing Manual

Word Annoyances

Word Hacks

Workflow in the 2007 Microsoft Office System

Working Smart in ADOBE Photoshop CS2

Working With Microsoft Visual Studio 2005 Team System

Write Great Code, Vol. 2: Thinking Low-Level, Writing High-Level

Write Portable Code

Writing Apache Modules with Perl and C

Writing GNU Emacs Extensions

Writing Perl Modules for CPAN

Writing Secure Code, Second Edition

Wrox's Asp.net 2.0 Visual Web Developer 2005 Express Edition Starter Kit

wxPython in Action


Other back to top

Want to help?

Share this blog with at least one person in real life. Thank you.