Leanpub Header

Skip to main content

Filters


Books

  1. No Description Available
  2. The ML Kitchen – Kitchen Edition explains Machine Learning using simple cooking metaphors.With no math or jargon, it introduces core ML ideas like data, training, and evaluation through everyday kitchen logic—perfect for complete beginners exploring Machine Learning for the first time.

  3. THE EXECUTIVE DECISION DEFENSE PLAYBOOK™ (2026 EDITION)
    Doctrine, Structures, and Reasoning Systems for Defensible Executive Judgment
    Er. Nabal Kishore Pande

    When decisions are examined months or years later, outcomes are irrelevant; reconstructibility is the test. This Playbook prescribes the exact reasoning elements reviewers will demand and the linguistic discipline required to survive hostile hindsight.AI compresses timelines and can obscure logic; citing an algorithm is not a defense. The Playbook requires system identification, input logging, validation steps, and documented human override to maintain executive accountability.Absent a contemporaneous record, silence is treated as negligence. The 24-Hour Rule enforces a non-negotiable window to create a concise, reconstructible record that preserves the decision as it existed before result disclosure.

  4. Master the seamless integration between Dynamics 365 Business Central and Microsoft Outlook! This comprehensive guide unlocks the secrets of the Outlook Add-in, from deployment methods to developer techniques. Learn how to set up Contact Insights and Document View add-ins, troubleshoot common issues, and leverage Microsoft Graph API for email interactions. Whether you're preparing for MB-820 certification or implementing Business Central solutions, this is your roadmap to productivity excellence.

  5. Black White, That's Right!
    DeLynn Nicole Poma

    3,959 words

  6. Predicting Persistence: Population Models for Conservation
    With examples and exercises in R
    Jacob Koella

    How long will a population persist, and why do some populations go extinct while others survive? 'Predicting Persistence' will help you to get a grasp of the fundamental aspects of the theory underlying these questions, and it will show you how to simulate them with the programming language R.

  7. The Admissions Forensics Playbook
    How Graduate Applications Are Really Read, Filtered, and Rejected in 78 Seconds
    Er. Nabal Kishore Pande

    Strong graduate applicants are rejected every year—not because they lack merit, but because their files trigger invisible risk signals during the first 78 seconds of review. This forensic manual exposes how graduate applications are actually scanned, filtered, and silently eliminated under cognitive load and institutional constraint. It documents the structural failure modes behind rejection and shows how to deploy applications that survive real review conditions.

  8. TOC-based Short Stories
    TOC-Based Short Stories of Flow, Focus, and Constraints
    Rajeev Athavale

    A collection of short stories about systems that look busy, responsible, and well-managed—yet quietly fail to move toward their goal. Each story offers a moment of recognition where seeing differently matters more than working harder.

  9. .NET 9 for Web Developers
    From console apps to production-ready web APIs and desktop clients using ASP.NET Core, Entity Framework Core, and MVVM
    GitforGits | Asian Publishing House

    Gain Hands-On Development of Web APIs, Data Access, Dependency Injection, and WPF Clients with ASP.NET Core, Entity Framework Core, and MVVM in .NET 9. The book teaches combination of XAML and C# in WPF, interact with data, and the MVVM pattern. You will learn to connect the WPF client to a live Web API, handling real-time updates, and managing states.

  10. C Programming
    How to Think Like a C Programmer
    Budi Raharjo

    This book is about thinking clearly in C. It teaches the mental habits behind safe memory use, careful pointer handling, robust error strategies, effective debugging, and clean interface design. It is written for programmers who want to write C code that remains correct, efficient, and understandable over time.

  11. No Description Available
  12. True Love Kiss
    Lara the charming goddess
    Uwuoroya Michael

    In a realm teetering on the edge of destruction, only one kiss can save it all. When Lara, a divine beauty cursed to bring ruin, is cast into an alternate universe by the celestial King Arthur, her only hope lies in discovering a love pure enough to shatter the darkness. But time is running out and the wicked princess of shadows waits to rise again. Will true love’s kiss be enough to seal her fate and restore peace to the realms? A spellbinding tale of destiny, sacrifice, and the power of a single kiss.

  13. What actually happens after you click Login? Beyond the screen, beyond the redirects, beyond the success message, enterprise Single Sign-On reveals its true complexity. Beyond the Login Screen exposes the real mechanics of SSO—HTTP calls, cookies, tokens, and protocol exchanges—across Spring Boot, Keycloak, and Azure Entra ID. This book is for professionals who need more than configurations: it is for those who must understand identity deeply, troubleshoot decisively, and deliver reliable authentication experiences when it matters most.

  14. No Description Available
  15. Hacker’s Shadow
    Advanced Cybersecurity & Ethical Hacking
    Piyush Kumar
    No Description Available