Feeds

Free Stob tome for every reader ...

When you buy an Apress, Apress Academic, or Friends of ED title

  • alert
  • submit to reddit

Site offer Our good friends at Apress have very kindly offered us another batch of Verity Stob's best selling collection of amusing stories and anecdotes to give away free with every book bought.

As you all know, Verity has been filling our lives with her musings and opinions since joining Vulture Central at the end of 2005, and her articles invite more than an occasional titter.

Indeed, our very own Andrew Orlowski reviewed these memoirs and proclaimed "this might well be the funniest book written about computing, and you should treat yourselves without delay".

So pop down to Register Books today and have a browse through our range of Apress, Apress Academic, and Friends of ED titles, the purchase of which will ensure a free and very funny copy of The Best of Verity Stob will be winging it's way to your doorstep before you know it.

We only have a limited number, so get in quick. There will only be one free book per order, allowing as many of you as possible to take advantage of this deal.

Apress programming titles can be found here.

Apress Academic programming titles can be found here.

Friends of Ed design titles can be found here.

Happy shopping. ®

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.