Null-A Three


Book Description

Gilbert Gosseyn awakens from a state of suspended animation to find himself a prisoner on a strange spaceship




Null-A Continuum


Book Description

Continuing A.E. van Vogt's World of Null-A In this heart-stopping sequel to A.E. van Vogt's World of Null-A, Gilbert Gosseyn, the superhuman amnesiac with a double brain, must pit his wits once more against the remorseless galactic dictator Enro the Red and the mysterious shadow-being known as The Follower. And he must do it while he is being hurled headlong through unimaginable distances in space, in time, and through alternate eternities to fend off the death and complete the rebirth of the Universe itself! At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




The World of Ā


Book Description

Contact has been made between other planets and Gilbert Gosseyn finds himself trying to stop a galactic war between Earth and Venus.




The World of Null-A


Book Description

The classic novel of non-Aristotelian logic and the coming race of supermen Grandmaster A. E. van Vogt was one of the giants of the 1940s, the Golden Age of classic SF. Of his masterpieces, The World of Null-A is his most famous and most influential. It was the first major trade SF hardcover ever, in 1949, and has been in print in various editions ever since. The entire careers of Philip K. Dick, Keith Laumer, Alfred Bester, Charles Harness, and Philip Jose Farmer were created or influenced by The World of Null-A, and so it is required reading for anyone who wishes to know the canon of SF classics. It is the year 2650 and Earth has become a world of non-Aristotelianism, or Null-A. This is the story of Gilbert Gosseyn, who lives in that future world where the Games Machine, made up of twenty-five thousand electronic brains, sets the course of people's lives. Gosseyn isn't even sure of his own identity, but realizes he has some remarkable abilities and sets out to use them to discover who has made him a pawn in an interstellar plot. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




Null States


Book Description

"After the last controversial global election, the global infomocracy that has ensured thirty years of world peace is fraying at the edges. As the new Supermajority government struggles to establish its legitimacy, agents of Information across the globe strive to keep the peace and maintain the flows of data that feed the new world order. In the newly-incorporated DarFur, a governor dies in a fiery explosion. In Geneva, a superpower hatches plans to bring micro-democracy to its knees. In Central Asia, a sprawling war among archaic states threatens to explode into a global crisis. And across the world, a shadowy plot is growing, threatening to strangle Information with the reins of power."--Front jacket flap.




The Players of Null-A


Book Description

In this sequel to World of Null-A, Gilbert Gosseyn must learn to use both hisbrains and function in various bodies in order to save the universe from Enrothe Red.




Advanced R


Book Description

An Essential Reference for Intermediate and Advanced R Programmers Advanced R presents useful tools and techniques for attacking many types of R programming problems, helping you avoid mistakes and dead ends. With more than ten years of experience programming in R, the author illustrates the elegance, beauty, and flexibility at the heart of R. The book develops the necessary skills to produce quality code that can be used in a variety of circumstances. You will learn: The fundamentals of R, including standard data types and functions Functional programming as a useful framework for solving wide classes of problems The positives and negatives of metaprogramming How to write fast, memory-efficient code This book not only helps current R users become R programmers but also shows existing programmers what’s special about R. Intermediate R programmers can dive deeper into R and learn new strategies for solving diverse problems while programmers from other languages can learn the details of R and understand why R works the way it does.




Building Three Desktop Applications Using Java GUI and PostgreSQL


Book Description

In this book, you will create three desktop applications using Java GUI and PostgreSQL. In this book, you will learn how to build from scratch a PostgreSQL database management system using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. Gradually and step by step, you will be taught how to utilize PostgreSQL in Java. In chapter one, you will create School database and its six tables. In chapter two, you will study: Creating the initial three table projects in the school database: Teacher table, TClass table, and Subject table; Creating database configuration files; Creating a Java GUI for viewing and navigating the contents of each table; Creating a Java GUI for inserting and editing tables; and Creating a Java GUI to join and query the three tables. In chapter three, you will learn: Creating the main form to connect all forms; Creating a project will add three more tables to the school database: the Student table, the Parent table, and Tuition table; Creating a Java GUI to view and navigate the contents of each table; Creating a Java GUI for editing, inserting, and deleting records in each table; Creating a Java GUI to join and query the three tables and all six. In chapter four, you will study how to query the six tables. In chapter five, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In chapter six, you will create Bank database and its tables. In chapter seven, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. In chapter eight, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. In chapter nine, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. In chapter ten, you will be taught how to create Crime database and its tables. In chapter eleven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. In chapter twelve, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo. In chapter thirteen, you will be taught to create Java GUI to view, edit, insert, and delete Feature_Extraction table data. This table has eight columns: feature_id (primary key), suspect_id (foreign key), feature1, feature2, feature3, feature4, feature5, and feature6. In chapter fourteen, you will add two tables: Police_Station and Investigator. These two tables will later be joined to Suspect table through another table, File_Case, which will be built in the seventh chapter. The Police_Station has six columns: police_station_id (primary key), location, city, province, telephone, and photo. The Investigator has eight columns: investigator_id (primary key), investigator_name, rank, birth_date, gender, address, telephone, and photo. Here, you will design a Java GUI to display, edit, fill, and delete data in both tables. In chapter fifteen, you will add two tables: Victim and File_Case. The File_Case table will connect four other tables: Suspect, Police_Station, Investigator and Victim. The Victim table has nine columns: victim_id (primary key), victim_name, crime_type, birth_date, crime_date, gender, address, telephone, and photo. The File_Case has seven columns: file_case_id (primary key), suspect_id (foreign key), police_station_id (foreign key), investigator_id (foreign key), victim_id (foreign key), status, and description. Here, you will also design a Java GUI to display, edit, fill, and delete data in both tables.




The Null Prophecy


Book Description

A book to challenge the status quo, spark a debate, and get people talking about the issues and questions we face as a country!




Three Minus One


Book Description

Three Minus One: Parents’ Stories of Love and Loss is a collection of intimate, soul-baring stories and artwork by parents who have lost a child to stillbirth, miscarriage, or neonatal death, inspired by the film Return to Zero. The loss of a child is unlike any other, and the impact that it has on the mother, the father, their family, and their friends is devastating—a shockwave of pain and guilt that spreads through their entire community. But the majority of those affected, especially mothers, often suffer their pain in silence, convinced that their grief and trauma is theirs to bear alone. This anthology of raw memoirs, heartbreaking stories, truthful poems, beautiful painting, and stunning photography from the parents who have suffered child loss offers insight into this unique, devastating and life-changing experience—breaking the silence and offering a ray of hope to the many parents out there in search of answers, understanding, and healing.