Code Name: C.I.N.D.E.R.
Title | Code Name: C.I.N.D.E.R. PDF eBook |
Author | Jack Edward Barrett |
Publisher | iUniverse |
Pages | 595 |
Release | 2018-04-07 |
Genre | Fiction |
ISBN | 1532042493 |
Jonathan St. Honore is a federal narcotics agent living a nightmare within the dark walls of a Saigon prison. He has been convicted of murdering a crewman after he intercepted a fishing boat he suspected was smuggling opium into the country that instead turned out to be pure gold. Even as he is ruthlessly tortured, Jonathan refuses to reveal where he has hidden what everyone believes to be narcotics worth millions of dollars. As a result, he is left behind to rot in prison at wars end. As time passes, the CIA and an influential senator on track to become the next president of the United States finally step in to help. As a spectacular rescue mission unfolds that leaves five grisly murders in its wake and instigates an attack that threatens to ignite World War III, now only time will tell if both Jonathan and the vast fortune will finally be liberated or if he will die in prison. Code Name: C.I.N.D.E.R. shares a thrilling tale of the intrigue, murder, and greed that unfolds after an American holding an enormous secret is left in Vietnam at the close of the war.
Programming for PaaS
Title | Programming for PaaS PDF eBook |
Author | Lucas Carlson |
Publisher | "O'Reilly Media, Inc." |
Pages | 152 |
Release | 2013-07-31 |
Genre | Computers |
ISBN | 1449335128 |
Platform-as-a-Service (PaaS) is gaining serious traction among web and mobile developers, but as new PaaS providers emerge and existing vendors upgrade their features, it’s hard to keep track of what PaaS has to offer. This thorough introduction takes you through the PaaS model from a developer’s point of view, and breaks down the types of services that Google App Engine, Windows Azure, Heroku, Cloud Foundry, and others deliver. Whether you’re an entrepreneur or part of a large enterprise development team, this book shows you how PaaS can help you focus on innovative applications, rather than spend your time worrying about technical operations. Track the cloud’s evolution from IaaS and DevOps to PaaS Learn how PaaS combines the simplicity of shared web hosting with the control of dedicated hosting Explore the benefits of both portable and non-portable PaaS options Apply best practices for moving legacy apps to PaaS—and understand the challenges involved Write new applications for PaaS from scratch with RESTful meta-services Use PaaS to build mobile apps with backend services that scale Examine the core services that each major provider currently offers Learn the situations in which PaaS might not be advantageous
Code Name Hélène
Title | Code Name Hélène PDF eBook |
Author | Ariel Lawhon |
Publisher | Vintage |
Pages | 498 |
Release | 2021-02-02 |
Genre | Fiction |
ISBN | 0525565493 |
Based on the thrilling real-life story of a socialite spy and astonishing woman who killed a Nazi with her bare hands and went on to become one of the most decorated women in WWII—from the New York Times bestselling author of I Was Anastasia. "Will fascinate readers of World War II history and thrill fans of fierce, brash, independent women." —Lisa Wingate, #1 New York Times bestselling author of Before We Were Yours Told in interweaving timelines organized around the four code names Nancy used during the war, Code Name Hélène is a spellbinding and moving story of enduring love, remarkable sacrifice and unfaltering resolve that chronicles the true exploits of a woman who deserves to be a household name. It is 1936 and Nancy Wake is an intrepid Australian expat living in Paris who has bluffed her way into a reporting job for Hearst newspaper when she meets the wealthy French industrialist Henri Fiocca. No sooner does Henri sweep Nancy off her feet and convince her to become Mrs. Fiocca than the Germans invade France and she takes yet another name: a code name. As Lucienne Carlier, Nancy smuggles people and documents across the border. Her success and her remarkable ability to evade capture earns her the nickname The White Mouse from the Gestapo. With a five million franc bounty on her head, Nancy is forced to escape France and leave Henri behind. When she enters training with the Special Operations Executives in Britain, her new comrades are instructed to call her Helene. And finally, with mission in hand, Nancy is airdropped back into France as the deadly Madam Andree, where she claims her place as one of the most powerful leaders in the French Resistance, armed with a ferocious wit, her signature red lipstick, and the ability to summon weapons straight from the Allied Forces. But no one can protect Nancy if the enemy finds out these four women are one and the same, and the closer to liberation France gets, the more exposed she—and the people she loves—become.
Cinder
Title | Cinder PDF eBook |
Author | Marissa Meyer |
Publisher | Macmillan |
Pages | 449 |
Release | 2013-01-08 |
Genre | Juvenile Fiction |
ISBN | 1250007208 |
Queen Levana is a ruler who uses her 'glamour' to gain power. but long before she crossed paths with Cinder, Scarlet, and Cress, Levana lived a very different story - a story that has never been told ... until now.
NASA Technical Memorandum
Title | NASA Technical Memorandum PDF eBook |
Author | |
Publisher | |
Pages | 40 |
Release | 1982 |
Genre | Aeronautics |
ISBN |
Final Report
Title | Final Report PDF eBook |
Author | William Likens |
Publisher | |
Pages | 36 |
Release | 1982 |
Genre | Landsat satellites |
ISBN |
Network Function Virtualization
Title | Network Function Virtualization PDF eBook |
Author | Ken Gray |
Publisher | Morgan Kaufmann |
Pages | 271 |
Release | 2016-07-04 |
Genre | Computers |
ISBN | 0128023430 |
Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight. Provides a comprehensive overview of Network Function Virtualization (NFV) Discusses how to determine if network function virtualization is right for an enterprise network Presents an ideal reference for those interested in NFV Network Service Chaining, NSC network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), caching, and software defined networks Includes hands-on, step-by-step guides for designing, deploying, and managing NFV in the enterprise Explains, and contrasts, all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight