My library button
  • Book cover of Daydreamer
    Rob Cameron

     · 2025

    An eleven-year-old boy copes with the challenges of his city life by weaving his reality into a magical realm of dragons, foxes, and trolls—until he must use the power of his creativity to save both of his worlds from destructive forces. This stunning debut is a profound exploration of imagination, community, and how the stories we tell both comfort us and challenge us to grow. Charles’ life is split between two worlds: one real and one fantasy. In the real world, he is a lonely, bullied kid who can’t keep up with school when the letters refuse to stay still on the page, and is constantly in trouble for getting distracted. He lives with his mom in an apartment building, where Glory, the grumpy old superintendent, fills his head with stories about the Dream Folk. In his fantasy world, the Sanctuary, Charles adventures with faeries and sprites and his two imaginary best friends. There, Charles's bullies become ogres, and Glory opens his arms wide to transform into a dragon. But when trolls move into Charles’ apartment building and bring with them a terrible secret, the stories he has been told and the ones he brings to life grow more complicated. To protect everyone he cares about, Charles must harness his imagination in ways he never dreamed, in this unique story of the spaces and narratives we create for ourselves, and the ways in which fantasy and reality collide and blur.

  • Book cover of Pro Windows Phone App Development
    Rob Cameron

     · 2012

    The Windows Phone 7 platform, now recently updated, provides a remarkable opportunity for Windows developers to create state-of-the-art mobile applications using their existing skills and a familiar toolset. Pro Windows Phone 7 Development, Second Edition helps you unlock the potential of this platform and create dazzling, visually rich, and highly functional applications for the Windows Phone Marketplace—including using new features like copy-and-paste and API improvements in the NoDo and Mango update waves. For developers new to the Windows Phone platform—whether .NET, iPhone, or Android developers—this book starts by introducing the features and specifications of the Windows Phone series, and then leads you through the complete application development process. You'll learn how to use Microsoft technologies like Silverlight, .NET, the XNA Framework, Visual Studio, and Expression Blend effectively, how to take advantage of the device's sensors with the location service, accelerometer, and touch, how to make your apps location-aware using GPS data, how to utilize the rich media capabilities of the Windows Phone series, and much more. Finally, you'll receive a full tutorial on how to publish and sell your application through the Windows Phone Marketplace. And in this second edition, learn quickly and easily how to take advantage of new API capabilities and HTML5 support right in your browser.

  • Book cover of Pro Windows Phone 7 Development
    Rob Cameron

     · 2011

    The Windows Phone 7 platform provides a remarkable opportunity for Windows developers to create state-of-the-art mobile applications using their existing skills and a familiar toolset. For iOS and Android developers, this book provides the right level of content to help developers rapidly come up to speed on Windows Phone. Pro Windows Phone 7 Development will help you unlock the potential of this platform and create dazzling, visually rich, and highly functional applications for the Windows Phone Marketplace. For developers new to the Windows Phone 7 platform, whether .NET, iPhone, or Android developers, this book starts by introducing you to the features and specifications of the Windows Phone series, and then leads you through the complete application development process. You'll learn how to use Microsoft technologies like Silverlight, .NET, the XNA Framework, Visual Studio, and Expression Blend effectively, how to take advantage of the available sensors such as the location service, accelerometer, and touch, make your apps location-aware using GPS data, utilize the rich media capabilities of the Windows Phone series, and much more. Finally, you'll receive a full tutorial on how to publish and sell your application through the Windows Phone Marketplace.

  • Book cover of Clockwork Phoenix 5

    • 2017 World Fantasy Award finalist for Best Anthology • Contains “The Fall Shall Further the Flight in Me” by Rachael K. Jones, 2017 World Fantasy Award finalist for Best Short Fiction • Contains “Sabbath Wine” by Barbara Krasnoff, 2016 Nebula Award finalist for Best Short Story • 2016 Locus Recommended Reading List, Best Anthology “Allen’s strange and lovely fifth genre-melding fantasy anthology selects 20 new short stories of unusual variety, texture, compassion, and perception. . . . All the stories afford thought-provoking glimpses into alternative realities that linger, sparking unconventional thoughts, long after they are first encountered.” —Publishers Weekly, starred review “The arrangement is superb. This anthology of 20 stories can resemble a symphony of themes and variations in a wide range of keys, or a tapestry whose elements form patterns of imagery and meaning that shift and offer new insights throughout the book.” —Locus The Clockwork Phoenix anthologies offer homes to “well-written stories occupying multiple subgenres, usually in the same story, often ambiguously,” as Locus Magazine once put it. The ground-breaking, boundary-pushing, award-nominated series has returned for a fifth incarnation, triumphantly risen from the ashes after another successful Kickstarter campaign. This is the largest installment yet, holding twenty new tales of beauty and strangeness. With original fiction from Jason Kimble, Rachael K. Jones, Patricia Russo, Marie Brennan, Benjanun Sriduangkaew, Rob Cameron, A. C. Wise, Gray Rinehart, Sam Fleming, Sunil Patel, C. S. E. Cooney and Carlos Hernandez, Holly Heisey, Barbara Krasnoff, Sonya Taaffe, Alex Dally MacFarlane, Shveta Thakrar, Cassandra Khaw, Keffy R. M. Kehrli, Rich Larson, and Beth Cato. Cover art by Paula Arwen Owen. “And then there is that secret restaurant . . . It is perfection on a plate! And you feel better about yourself and your life and the world every time you go there. Clockwork Phoenix is the name of this restaurant, and Mike Allen is the restaurateur. One sublime dish after another, and yet I still have my favorites that I keep coming back to.” —Little Red Reviewer Table of contents: “The Wind at His Back” by Jason Kimble “The Fall Shall Further the Flight in Me” by Rachael K. Jones “The Perfect Happy Family” by Patricia Russo “The Mirror-City” by Marie Brennan “The Finch’s Wedding and the Hive That Sings” by Benjanun Sriduangkaew “Squeeze” by Rob Cameron “A Guide to Birds by Song (After Death)” by A.C. Wise “The Sorcerer of Etah” by Gray Rinehart “The Prime Importance of a Happy Number” by Sam Fleming “Social Visiting” by Sunil Patel “The Book of May” by C.S.E. Cooney and Carlos Hernandez “The Tiger’s Silent Roar” by Holly Heisey “Sabbath Wine” by Barbara Krasnoff “The Trinitite Golem” by Sonya Taaffe “Two Bright Venuses” by Alex Dally MacFarlane “By Thread of Night and Starlight Needle” by Shveta Thakrar “The Games We Play” by Cassandra Khaw “The Road, and the Valley, and the Beasts” by Keffy R.M. Kehrli “Innumerable Glimmering Lights” by Rich Larson “The Souls of Horses” by Beth Cato

  • Book cover of Juniper(r) Networks Secure Access SSL VPN Configuration Guide

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform. - Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP. - Learn to scale your appliances to meet the demands of remote workers and offices. - Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

  • Book cover of IT Security Interviews Exposed

    Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008

  • Book cover of Juniper SRX Series

    This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience. While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations. Explore SRX components, platforms, and various deployment scenarios Learn best practices for configuring SRX’s core networking features Leverage SRX system services to attain the best operational state Deploy SRX in transparent mode to act as a Layer 2 bridge Configure, troubleshoot, and deploy SRX in a highly available manner Design and configure an effective security policy in your network Implement and configure network address translation (NAT) types Provide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools

  • Book cover of Silverlight Recipes

    Silverlight Recipes: A Problem-Solution Approach is your practical companion to developing rich, interactive web applications with Microsoft's latest technology. This book tackles common problems and scenarios that on-the-job developers face every day by revealing code and detailed solutions. You’ll quickly be able to integrate real-world, functioning code into your applications—and save hours of coding time. The recipes included in Silverlight Recipes: A Problem-Solution Approach have been carefully selected and tested with the professional developer in mind. You'll find problems stated clearly and succinctly, artful solutions explored, and ample discussion of the code and context so you're immediately clear how the solution will support your project. Enjoy practical coverage of Silverlight development in many projects and contexts, including: Designing complete, rich, interactive user experiences Manipulating content and the runtime environment through the Silverlight Plug-in Runtime API Consuming, transforming, and displaying content in your Silverlight web application through XML, LINQ-based data access, and isolated storage Building custom controls for your Silverlight project Integrating rich media, including audio and video, to create a very dynamic user interface and experience Using new Silverlight features, including .NET Framework integration, the use of dynamic languages like Python and Ruby in Silverlight development, and digital rights management support Find instant solutions, comprehensive Silverlight coverage, and time-saving expert advice, all in Silverlight Recipes: A Problem-Solution Approach.

  • Book cover of Silverlight 2 Recipes

    Microsoft .NET architect evangelist Jit Ghosh presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding time. The recipes included in Silverlight 2 Recipes: A Problem-Solution Approach have been carefully selected and tested with the professional developer in mind. You'll find clearly and succinctly stated problems, well–architected solutions, and ample discussion of the code and context so you can see immediately how the solution will support your project. Enjoy practical coverage of Silverlight development in many projects and contexts, including Designing complete, rich, interactive user experiences Manipulating content and the runtime environment through the Silverlight Plugin Runtime API Consuming, transforming, and displaying content in your Silverlight web application through XML, LINQ–based data access, and isolated storage Building custom controls for your Silverlight project Integrating rich media, including audio and video, to create a very dynamic user interface and experience Using new Silverlight 2 features, including .NET Framework integration, the use of dynamic languages like Python and Ruby in Silverlight development, and digital rights management support Find instant solutions, comprehensive Silverlight 2 coverage, and time–saving expert advice, all in Silverlight 2 Recipes: A Problem-Solution Approach.

  • Book cover of Configuring Juniper Networks NetScreen and SSG Firewalls

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. - Configure Juniper's Instant Virtual Extranet (IVE) - Install and set up IVE through either the command line interface (CLI) or Web-based console - Master the "3 Rs": Realms, Roles, and Resources - Realize the potential of the "3Rs" for endpoint security, sign-in policies, and authorization of servers - Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) - Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field - Integrate IVE with Terminal Services and Citrix - Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet - Ensure Endpoint Security - Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network - Manage the Remote Access Needs of Your Organization - Configure Web access, file access and telnet/SSH access for remote users and offices - Configure Core Networking Components through the System Menu - Create clusters, manage virtual systems, and monitor logs, reports, and alerts - Create Bullet-Proof Sign-in Policies - Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages - Use the IVE for Log-Related Tasks - Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.