Best of
Computer-Science

2009

But How Do It Know? - The Basic Principles of Computers for Everyone


J. Clark Scott - 2009
    Its humorous title begins with the punch line of a classic joke about someone who is baffled by technology. It was written by a 40-year computer veteran who wants to take the mystery out of computers and allow everyone to gain a true understanding of exactly what computers are, and also what they are not. Years of writing, diagramming, piloting and editing have culminated in one easy to read volume that contains all of the basic principles of computers written so that everyone can understand them. There used to be only two types of book that delved into the insides of computers. The simple ones point out the major parts and describe their functions in broad general terms. Computer Science textbooks eventually tell the whole story, but along the way, they include every detail that an engineer could conceivably ever need to know. Like Momma Bear's porridge, But How Do It Know? is just right, but it is much more than just a happy medium. For the first time, this book thoroughly demonstrates each of the basic principles that have been used in every computer ever built, while at the same time showing the integral role that codes play in everything that computers are able to do. It cuts through all of the electronics and mathematics, and gets right to practical matters. Here is a simple part, see what it does. Connect a few of these together and you get a new part that does another simple thing. After just a few iterations of connecting up simple parts - voilà! - it's a computer. And it is much simpler than anyone ever imagined. But How Do It Know? really explains how computers work. They are far simpler than anyone has ever permitted you to believe. It contains everything you need to know, and nothing you don't need to know. No technical background of any kind is required. The basic principles of computers have not changed one iota since they were invented in the mid 20th century. "Since the day I learned how computers work, it always felt like I knew a giant secret, but couldn't tell anyone," says the author. Now he's taken the time to explain it in such a manner that anyone can have that same moment of enlightenment and thereafter see computers in an entirely new light.

Game Engine Architecture


Jason Gregory - 2009
    The concepts and techniques described are the actual ones used by real game studios like Electronic Arts and Naughty Dog. The examples are often grounded in specific technologies, but the discussion extends way beyond any particular engine or API. The references and citations make it a great jumping off point for those who wish to dig deeper into any particular aspect of the game development process.Intended as the text for a college level series in game programming, this book can also be used by amateur software engineers, hobbyists, self-taught game programmers, and existing members of the game industry. Junior game engineers can use it to solidify their understanding of game technology and engine architecture. Even senior engineers who specialize in one particular field of game development can benefit from the bigger picture presented in these pages.

Growing Object-Oriented Software, Guided by Tests


Steve Freeman - 2009
    This one's a keeper." --Robert C. Martin "If you want to be an expert in the state of the art in TDD, you need to understand the ideas in this book."--Michael Feathers Test-Driven Development (TDD) is now an established technique for delivering better software faster. TDD is based on a simple idea: Write tests for your code before you write the code itself. However, this simple idea takes skill and judgment to do well. Now there's a practical guide to TDD that takes you beyond the basic concepts. Drawing on a decade of experience building real-world systems, two TDD pioneers show how to let tests guide your development and "grow" software that is coherent, reliable, and maintainable. Steve Freeman and Nat Pryce describe the processes they use, the design principles they strive to achieve, and some of the tools that help them get the job done. Through an extended worked example, you'll learn how TDD works at multiple levels, using tests to drive the features and the object-oriented structure of the code, and using Mock Objects to discover and then describe relationships between objects. Along the way, the book systematically addresses challenges that development teams encounter with TDD--from integrating TDD into your processes to testing your most difficult features. Coverage includes - Implementing TDD effectively: getting started, and maintaining your momentum throughout the project - Creating cleaner, more expressive, more sustainable code - Using tests to stay relentlessly focused on sustaining quality - Understanding how TDD, Mock Objects, and Object-Oriented Design come together in the context of a real software development project - Using Mock Objects to guide object-oriented designs - Succeeding where TDD is difficult: managing complex test data, and testing persistence and concurrency

Pro Git


Scott Chacon - 2009
    It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

C++ Concurrency in Action: Practical Multithreading


Anthony Williams - 2009
    This book will show you how to write robust multithreaded applications in C++ while avoiding many common pitfalls.About the TechnologyMultiple processors with multiple cores are the norm these days. The C++11 version of the C++ language offers beefed-up support for multithreaded applications, and requires that you master the principles, techniques, and new language features of concurrency to stay ahead of the curve.About the BookWithout assuming you have a background in the subject, CC++ Concurrency in Action gradually enables you to write robust and elegant multithreaded applications in C++11. You'll explore the threading memory model, the new multithreading support library, and basic thread launching and synchronization facilities. Along the way, you'll learn how to navigate the trickier bits of programming for concurrency.Written for C++ programmers who are new to concurrency and others who may have written multithreaded code using other languages, APIs, or platforms.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideWritten for the new C++11 Standard Programming for multiple cores and processors Small examples for learning, big examples for practice====================Table of ContentsHello, world of concurrency in C++! Managing threads Sharing data between threads Synchronizing concurrent operations The C++ memory model and operations on atomic types Designing lock-based concurrent data structures Designing lock-free concurrent data structures Designing concurrent code Advanced thread management Testing and debugging multithreaded applications

Apprenticeship Patterns: Guidance for the Aspiring Software Craftsman


Dave Hoover - 2009
    To grow professionally, you also need soft skills and effective learning techniques. Honing those skills is what this book is all about. Authors Dave Hoover and Adewale Oshineye have cataloged dozens of behavior patterns to help you perfect essential aspects of your craft. Compiled from years of research, many interviews, and feedback from O'Reilly's online forum, these patterns address difficult situations that programmers, administrators, and DBAs face every day. And it's not just about financial success. Apprenticeship Patterns also approaches software development as a means to personal fulfillment. Discover how this book can help you make the best of both your life and your career. Solutions to some common obstacles that this book explores in-depth include:Burned out at work? "Nurture Your Passion" by finding a pet project to rediscover the joy of problem solving.Feeling overwhelmed by new information? Re-explore familiar territory by building something you've built before, then use "Retreat into Competence" to move forward again.Stuck in your learning? Seek a team of experienced and talented developers with whom you can "Be the Worst" for a while. "Brilliant stuff! Reading this book was like being in a time machine that pulled me back to those key learning moments in my career as a professional software developer and, instead of having to learn best practices the hard way, I had a guru sitting on my shoulder guiding me every step towards master craftsmanship. I'll certainly be recommending this book to clients. I wish I had this book 14 years ago!" -Russ Miles, CEO, OpenCredo

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series


Johnny Long - 2009
    It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one' - from the Foreword to the first "Stealing the Network" book, "How to Own the Box", Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON. For the very first time, the complete "Stealing the Network" epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass. This book contains all of the material from each of the four books in the "Stealing the Network" series. All of the stories and tech from: "How to Own the Box"; "How to Own a Continent"; "How to Own an Identity"; and, "How to Own a Shadow". Plus: finally - find out how the story ends! The final chapter is here! There is a DVD full of behind the scenes stories and insider info about the making of these cult classics! Now for the first time the entire series is one 1000 plus page book. The DVD contains 20 minutes of behind the scenes footage. Readers will finally learn the fate of 'Knuth' in the much anticipated final chapter.

The Art of Unit Testing: With Examples in .NET


Roy Osherove - 2009
    It guides you step by step from simple tests to tests that are maintainable, readable, and trustworthy. It covers advanced subjects like mocks, stubs, and frameworks such as Typemock Isolator and Rhino Mocks. And you'll learn about advanced test patterns and organization, working with legacy code and even untestable code. The book discusses tools you need when testing databases and other technologies. It's written for .NET developers but others will also benefit from this book.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.Table of ContentsThe basics of unit testingA first unit testUsing stubs to break dependenciesInteraction testing using mock objectsIsolation (mock object) frameworksTest hierarchies and organizationThe pillars of good testsIntegrating unit testing into the organizationWorking with legacy code

Probabilistic Graphical Models: Principles and Techniques


Daphne Koller - 2009
    The framework of probabilistic graphical models, presented in this book, provides a general approach for this task. The approach is model-based, allowing interpretable models to be constructed and then manipulated by reasoning algorithms. These models can also be learned automatically from data, allowing the approach to be used in cases where manually constructing a model is difficult or even impossible. Because uncertainty is an inescapable aspect of most real-world applications, the book focuses on probabilistic models, which make the uncertainty explicit and provide models that are more faithful to reality.Probabilistic Graphical Models discusses a variety of models, spanning Bayesian networks, undirected Markov networks, discrete and continuous models, and extensions to deal with dynamical systems and relational data. For each class of models, the text describes the three fundamental cornerstones: representation, inference, and learning, presenting both basic concepts and advanced techniques. Finally, the book considers the use of the proposed framework for causal reasoning and decision making under uncertainty. The main text in each chapter provides the detailed technical development of the key ideas. Most chapters also include boxes with additional material: skill boxes, which describe techniques; case study boxes, which discuss empirical cases related to the approach described in the text, including applications in computer vision, robotics, natural language understanding, and computational biology; and concept boxes, which present significant concepts drawn from the material in the chapter. Instructors (and readers) can group chapters in various combinations, from core topics to more technically advanced material, to suit their particular needs.

Natural Language Processing with Python


Steven Bird - 2009
    With it, you'll learn how to write Python programs that work with large collections of unstructured text. You'll access richly annotated datasets using a comprehensive range of linguistic data structures, and you'll understand the main algorithms for analyzing the content and structure of written communication.Packed with examples and exercises, Natural Language Processing with Python will help you: Extract information from unstructured text, either to guess the topic or identify "named entities" Analyze linguistic structure in text, including parsing and semantic analysis Access popular linguistic databases, including WordNet and treebanks Integrate techniques drawn from fields as diverse as linguistics and artificial intelligenceThis book will help you gain practical skills in natural language processing using the Python programming language and the Natural Language Toolkit (NLTK) open source library. If you're interested in developing web applications, analyzing multilingual news sources, or documenting endangered languages -- or if you're simply curious to have a programmer's perspective on how human language works -- you'll find Natural Language Processing with Python both fascinating and immensely useful.

Understanding Cryptography: A Textbook For Students And Practitioners


Christof Paar - 2009
    Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

The Little Book of Semaphores: The Ins and Outs of Concurrency Control and Common Mistakes


Allen B. Downey - 2009
    In most computer science curricula, synchronization is a module in an Operating Systems class. OS textbooks present a standard set of problems with a standard set of solutions, but most students don't get a good understanding of the material or the ability to solve similar problems. The approach of this book is to identify patterns that are useful for a variety of synchronization problems and then show how they can be assembled into solutions. After each problem, the book offers a hint before showing a solution, giving students a better chance of discovering solutions on their own. The book covers the classical problems, including "Readers-writers," "Producer-consumer," and "Dining Philosophers." In addition, it collects a number of not-so-classical problems. *** Published under the terms of the GNU Free Documentation License. Money raised from the sale of this book supports the development of free software and documentation.

The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams


Donald Ervin Knuth - 2009
    Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 Art of Computer Programming, Volume 4, Fascicle 1, The: Bitwise Tricks & Techniques; Binary Decision Diagrams: Bitwise Tricks & Techniques; Binary Decision Diagrams This multivolume work on the analysis of algorithms has long been recognized as the definitive description of classical computer science. The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth's writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his "cookbook" solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books. To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called fascicles, which will be published at regular intervals. Each fascicle will encompass a section or more of wholly new or revised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete. Volume 4, Fascicle 1 This fascicle, enlivened by a wealth of Knuth's typically enjoyable examples, describes basic "broadword" operations and an important class of data structures that can make computer programs run dozens--even thousands--of times faster. The author brings together and explains a substantial amount of previously scattered but eminently practical information known only to a few specialists. The book also includes nearly five-hundred exercises for self-study, with detailed answers given in nearly every case; dozens of these exercises present original material that has never before been published. Simply put, this fascicle is a must-have for anybody who is faced with tough problems of a combinatorial flavor. It demonstrates how ordinary programmers can make use of powerful techniques that heretofore seemed to be available only to people who used specialized languages and software. It shows how ideas once thought to be "far out" are now ready to become a part of the programming mainstream.

The Art of Computer Programming, Volume 4, Fascicles 0-4


Donald Ervin Knuth - 2009
    4, Fascicle 1 Finally, after a wait of more than thirty-five years, the first part of Volume 4 is at last ready for publication. Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 Art of Computer Programming, Vo... Full description

Software Engineering


Kassem A. Saleh - 2009
    Moreover, software projects must be completed on time and within budgets and are important challenges to software engineers. Research has shown that one-third of software projects are never completed, another third do not fulfill their promises.Software Engineering provides the software engineering fundamentals, principles and skills needed to develop and maintain high quality software products. The software engineering processes and techniques covered include requirements specification, design, implementation, testing and management of software projects. This up-to-date book is modeled on the recommendations and guidelines prescribed in the Guide to the Software Engineering Body of Knowledge (SWEBOK) published by the IEEE Computer Society, and the Software Engineering Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering published by the IEEE Computer Society and the Association for Computing Machinery Joint Task Force on Computing Curricula.At the end of each chapter, the reader will be able to perform tangible software engineering tasks by applying the learned techniques and methods, will be familiar with the terminology, the principles by mastering the subjects, and will be able to analyze existing task deliverables, compare and critique the different techniques. The book is designed as a text for an undergraduate first course in software engineering and graduate bridging courses in information technology. In addition, Software Engineering can be used by practitioners who need to refresh their knowledge with the latest in software engineering techniques and processes. The prerequisite to use this text is to have a background in an object-oriented programming language.

The Quest for Artificial Intelligence: A History of Ideas and Achievements


Nils J. Nilsson - 2009
    This book traces the history of the subject, from the early dreams of eighteenth-century (and earlier) pioneers to the more successful work of today's AI engineers. AI is becoming more and more a part of everyone's life. The technology is already embedded in face-recognizing cameras, speech-recognition software, Internet search engines, and health-care robots, among other applications. The book's many diagrams and easy-to-understand descriptions of AI programs will help the casual reader gain an understanding of how these and other AI systems actually work. Its thorough (but unobtrusive) end-of-chapter notes containing citations to important source materials will be of great use to AI scholars and researchers. This book promises to be the definitive history of a field that has captivated the imaginations of scientists, philosophers, and writers for centuries.

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Regular Expressions Cookbook


Jan Goyvaerts - 2009
    Every programmer can find uses for regular expressions, but their power doesn't come worry-free. Even seasoned users often suffer from poor performance, false positives, false negatives, or perplexing bugs. Regular Expressions Cookbook offers step-by-step instructions for some of the most common tasks involving this tool, with recipes for C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET.With this book, you will:Understand the basics of regular expressions through a concise tutorial Use regular expressions effectively in several programming and scripting languages Learn how to validate and format input Manage words, lines, special characters, and numerical values Find solutions for using regular expressions in URLs, paths, markup, and data exchange Learn the nuances of more advanced regex features Understand how regular expressions' APIs, syntax, and behavior differ from language to language Write better regular expressions for custom needs Whether you're a novice or an experienced user, Regular Expressions Cookbook will help deepen your knowledge of this unique and irreplaceable tool. You'll learn powerful new tricks, avoid language-specific gotchas, and save valuable time with this huge library of proven solutions to difficult, real-world problems.

Foundations of Algorithms


Richard Neapolitan - 2009
    The Volume Is Accessible To Mainstream Computer Science Students Who Have A Background In College Algebra And Discrete Structures. To Support Their Approach, The Authors Present Mathematical Concepts Using Standard English And A Simpler Notation Than Is Found In Most Texts. A Review Of Essential Mathematical Concepts Is Presented In Three Appendices. The Authors Also Reinforce The Explanations With Numerous Concrete Examples To Help Students Grasp Theoretical Concepts.

Flex & Bison: Text Processing Tools


John R. Levine - 2009
    flex & bison is the long-awaited sequel to the classic O'Reilly book, lex & yacc. In the nearly two decades since the original book was published, the flex and bison utilities have proven to be more reliable and more powerful than the original Unix tools.flex & bison covers the same core functionality vital to Linux and Unix program development, along with several important new topics. You'll find revised tutorials for novices and references for advanced users, as well as an explanation of each utility's basic usage and simple, standalone applications you can create with them. With flex & bison, you'll discover the wide range of uses these flexible tools offer.Address syntax crunching that regular expressions tools can't handleBuild compilers and interpreters, and handle a wide range of text processing functionsInterpret code, configuration files, or any other structured formatLearn key programming techniques, including abstract syntax trees and symbol tablesImplement a full SQL grammar-with complete sample codeUse new features such as pure (reentrant) lexers and parsers, powerful GLR parsers, and interfaces to C++

Tutorial on Neural Systems Modeling


Thomas J. Anastasio - 2009
    The goal of this new book is to make these tools accessible. It is written specifically for students in neuroscience, cognitive science, and related areas who want to learn about neuralsystems modeling but lack extensive background in mathematics and computer programming.The book opens with an introduction to computer programming. Each of twelve subsequent chapters presents a different modeling paradigm by describing its basic structure and showing how it can be applied in understanding brain function. The text guides the reader through short, simple computerprograms--printed in the book and available by download at the companion website--that implement the paradigms and simulate real neural systems. Motivation for the simulations is provided in the form of a narrative that places specific aspects of neural system behavior in the context of more generalbrain function. The narrative integrates instruction for using the programs with description of neural system function, and readers can actively experience the fun and excitement of doing the simulations themselves. Designed as a hands-on tutorial for students, this book also serves instructors asboth a teaching tool and a source of examples and exercises that provide convenient starting points for more in-depth exploration of topics of their own specific interest.The distinguishing pedagogical feature of this book is its computer programs, written in MATLAB, that help readers develop basic skill in the area of neural systems modeling. (All of the program files are available online via the book's companion website.) Actual data on real neural systems ispresented in the book for comparison with the results of the simulations. Also included are asides (Math Boxes) that present mathematical material that is relevant but not essential to running the programs. Exercises and references at the end of each chapter invite readers to explore each topicarea on their own.

Java How to Program: Early Objects Version [With CDROM]


Paul Deitel - 2009
    This revision is current with the Java SE 6 revisions that have occurred since the book was last published. KEY TOPICS: Introduction to Computers, the Internet and the Web;Introduction to Java Applications; Introduction to Classes and Objects; Control Statements: Part 1; Control Statements: Part 2; Methods: A Deeper Look; Arrays and ArrayLists; Classes and Objects: A Deeper Look; Object-Oriented Programming: Inheritance; Object-Oriented Programming: Polymorphism; Exception Handling; (Optional) ATM Case Study, Part 1: Object-Oriented Design with the UML; (Optional) ATM Case Study, Part 2: Implementing an Object-Oriented Design; GUI Components: Part 1; Graphics and Java 2D(TM); Strings, Characters and Regular Expressions; Files, Streams and Object Serialization; Recursion; Searching, Sorting and Big O; Generic Collections; Generics; Data Structures; Applets and Java Web Start; Multimedia: Applets and Applications; GUI Components: Part 2; Multithreading; Networking; Accessing Databases with JDBC; Web Applications: Part 1; Web Applications: Part 2; JAX-WS Web Services. MARKET: A useful reference for programmers who need to brush up their Java skills.

Principles of Synthetic Intelligence: Psi: An Architecture of Motivated Cognition


Joscha Bach - 2009
    These architectures and their implementation have several lessons for other architectures and models. Most notably, the PSI architecture includes drives and thusdirectly addresses questions of emotional behavior. An architecture including drives helps clarify how emotions could arise. It also changes the way that the architecture works on a fundamental level, providing an architecture more suited for behaving autonomously in a simulated world. PSI includesthree types of drives, physiological (e.g., hunger), social (i.e., affiliation needs), and cognitive (i.e., reduction of uncertainty and expression of competency). These drives routinely influence goal formation and knowledge selection and application. The resulting architecture generates new kindsof behaviors, including context dependent memories, socially motivated behavior, and internally motivated task switching. This architecture illustrates how emotions and physical drives can be included in an embodied cognitive architecture.The PSI architecture, while including perceptual, motor, learning, and cognitive processing components, also includes several novel knowledge representations: temporal structures, spatial memories, and several new information processing mechanisms and behaviors, including progress through types ofknowledge sources when problem solving (the Rasmussen ladder), and knowledge-based hierarchical active vision. These mechanisms and representations suggest ways for making other architectures more realistic, more accurate, and easier to use.The architecture is demonstrated in the Island simulated environment. While it may look like a simple game, it was carefully designed to allow multiple tasks to be pursued and provides ways to satisfy the multiple drives. It would be useful in its own right for developing other architecturesinterested in multi-tasking, long-term learning, social interaction, embodied architectures, and related aspects of behavior that arise in a complex but tractable real-time environment.The resulting models are not presented as validated cognitive models, but as theoretical explorations in the space of architectures for generating behavior. The sweep of the architecture can thus be larger-it presents a new cognitive architecture attempting to provide a unified theory of cognition. It attempts to cover perhaps the largest number of phenomena to date. This is not a typical cognitive modeling work, but one that I believe that we can learn much from.--Frank E. Ritter, Series EditorAlthough computational models of cognition have become very popular, these models are relatively limited in their coverage of cognition-- they usually only emphasize problem solving and reasoning, or treat perception and motivation as isolated modules. The first architecture to cover cognition morebroadly is PSI theory, developed by Dietrich Dorner. By integrating motivation and emotion with perception and reasoning, and including grounded neuro-symbolic representations, PSI contributes significantly to an integrated understanding of the mind. It provides a conceptual framework thathighlights the relationships between perception and memory, language and mental representation, reasoning and motivation, emotion and cognition, autonomy and social behavior. It is, however, unfortunate that PSI's origin in psychology, its methodology, and its lack of documentation have limited itsimpact. The proposed book adapts Psi theory to cognitive science and artificial intelligence, by elucidating both its theoretical and technical frameworks, and clarifying its contribution to how we have come to understand cognition.

ERLANG Programming


Francesco Cesarini - 2009
    Erlang is gaining widespread adoption with the advent of multi-core processors and their new scalable approach to concurrency. With this guide you'll learn how to write complex concurrent programs in Erlang, regardless of your programming background or experience. Written by leaders of the international Erlang community -- and based on their training material -- Erlang Programming focuses on the language's syntax and semantics, and explains pattern matching, proper lists, recursion, debugging, networking, and concurrency. This book helps you:Understand the strengths of Erlang and why its designers included specific features Learn the concepts behind concurrency and Erlang's way of handling it Write efficient Erlang programs while keeping code neat and readable Discover how Erlang fills the requirements for distributed systems Add simple graphical user interfaces with little effort Learn Erlang's tracing mechanisms for debugging concurrent and distributed systems Use the built-in Mnesia database and other table storage features Erlang Programming provides exercises at the end of each chapter and simple examples throughout the book.

Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics)


EC-Council - 2009
    The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Network Intrusions and Cybercrime includes a discussion of tools used in investigations as well as information on investigating network traffic, web attacks, DOS attacks, Corporate Espionage and much more!

Developing with Web Standards


John Allsopp - 2009
    Using this book, readers will learn current best practices in standards-based development.

Microsoft Windows 7 Unleashed


Paul McFedries - 2009
    With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details. Microsoft(R) Windows 7 Unleashed gives IT professionals, serious power users, and true geeks the powerhouse Windows 7 tweaks, hacks, techniques, and insights they need: knowledge that simply can't be found anywhere else. Top Windows expert Paul McFedries dives deep into Windows 7, returning with the most powerful ways to handle everything from networking to administration, security to scripting. McFedries begins with advanced customization, covering everything from startup/shutdown to the file system. He introduces new ways to tune Windows 7 performance, police Windows via Group Policies, tweak the Registry, make the most of Windows 7s management tools, and control Windows 7 from the command line. You'll find thorough coverage of securing Windows 7, including detailed guidance on web and email security and hardening both wireless and wired networks. You'll also discover better ways to troubleshoot devices, networks, and startup; add Macs to Windows networks; and automate Windows administration with state-of-the-art scripting techniques. This book is packed with expert tips, tricks, and troubleshooting techniques drawn from McFedries' unsurpassed Windows experience. If you want maximum value and performance from your Windows 7 PCs, you won't find a more valuable resource. Customize everything about Windows 7: IE8, startup/shutdown, file systems, the Start menu, Taskbar, and moreSystematically monitor, tune, and optimize Windows performance-including practical techniques for accelerating startupSet up an easy, automated 9-Step maintenance schedule for any Windows 7 PCUnleash Windows 7s power user tools, including Group Policies, the Registry, MMC, and the command lineSecure Windows 7 with security settings: auto-lock, Windows Firewall, Windows Defender, parental controls, BitLocker encryption, and moreProtect your web privacy with Windows 7s new InPrivate BrowsingSolve problems with Windows 7, startup, networking, and hardwareSet up reliable Windows 7 networks, and manage them efficientlySafely provide remote access and VPN connectivityUse Windows 7 as a Web serverProgram the Windows Scripting Host and Windows PowerShell ON THE WEB: Free Online Edition! When Microsoft releases the final product, you can get an updated edition of this book absolutely free!All examples and source code presented in this book $49.99 USA / $59.99 CANz

Modeling and Reasoning with Bayesian Networks


Adnan Darwiche - 2009
    It provides an extensive discussion of techniques for building Bayesian networks that model real-world situations, including techniques for synthesizing models from design, learning models from data, and debugging models using sensitivity analysis. It also treats exact and approximate inference algorithms at both theoretical and practical levels. The author assumes very little background on the covered subjects, supplying in-depth discussions for theoretically inclined readers and enough practical details to provide an algorithmic cookbook for the system developer.

Topology for Computing


Afra J. Zomorodian - 2009
    Such problems arise in many areas, such as computer graphics, robotics, structural biology, and chemistry. The author starts from the basics of topology, assuming no prior exposure to the subject, and moves rapidly up to recent advances in the area, including topological persistence and hierarchical Morse complexes. Algorithms and data structures are presented when appropriate.

Introduction to Multivariate Statistical Analysis in Chemometrics


Kurt Varmuza - 2009
    It includes discussions of various statistical methods, such as principal component analysis, regression analysis, classification methods, and clustering.Written by a chemometrician and a statistician, the book reflects the practical approach of chemometrics and the more formally oriented one of statistics. To enable a better understanding of the statistical methods, the authors apply them to real data examples from chemistry. They also examine results of the different methods, comparing traditional approaches with their robust counterparts. In addition, the authors use the freely available R package to implement methods, encouraging readers to go through the examples and adapt the procedures to their own problems.Focusing on the practicality of the methods and the validity of the results, this book offers concise mathematical descriptions of many multivariate methods and employs graphical schemes to visualize key concepts. It effectively imparts a basic understanding of how to apply statistical methods to multivariate scientific data.

iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod Touch


Maher Ali - 2009
    More than one million iPhone 3G phones were sold in the first three days of release and millions more are sure to be in the hands of iPhone fans each year. Apple's iPhone SDK has been updated and includes more than one thousand new APIs that developers will want to get their hands on.iPhone SDK 3 Programming shows you how to build great applications for the iPhone and iPod Touch. Inside, veteran mobile developer and Bell Labs scientist Maher Ali begins with a foundational introduction to Objective-C and Cocoa programming, and then guides you through building programs with Apple's iPhone SDK 3.Covers the complete application development process, and highlights all the key device features including the camera, location awareness, and more Completely revised and redesigned with more than 100 new pages of content iPhone's new SDK release contains more than one thousand new APIs you will want to use right away Includes a focused introduction to the Objective-C language and Cocoa frameworks that new iPhone developers need With this advanced resource, you'll get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch.

Dynamic Linear Models with R


Giovanni Petris - 2009
    After a detailed introduction to general state space models, this book focuses on dynamic linear models, emphasizing their Bayesian analysis. Whenever possible it is shown how to compute estimates and forecasts in closed form; for more complex models, simulation techniques are used. A final chapter covers modern sequential Monte Carlo algorithms.The book illustrates all the fundamental steps needed to use dynamic linear models in practice, using R. Many detailed examples based on real data sets are provided to show how to set up a specific model, estimate its parameters, and use it for forecasting. All the code used in the book is available online.No prior knowledge of Bayesian statistics or time series analysis is required, although familiarity with basic statistics and R is assumed.

Programming in C


Pradip Dey - 2009
    Separate chapters on linked lists and stacks, queues, and trees, with their implementation in C, have been provided to simplify the learning of complex concepts. Some advanced features of C such as memory models, command-line arguments, and bitwise operators have also been included. Case studies demonstrating the use of C in solving mathematical as well as real-life problems have also been presented. This edition also highlights C99 features wherever relevant in the text.The book is easy-to-understand and student-friendly with plenty of programs complete with source codes, sample outputs, and test cases. Readers will find this book an excellent companion for self-study owing to its numerous examples, review questions, and programming exercises.

Applications of Automata Theory and Algebra: Via the Mathematical Theory of Complexity to Biology, Physics, Psychology, Philosophy, and Games


John L. Rhodes - 2009
    Yet it has never been available in-print until now. Nevertheless, it is the founding work of algebraic engineering, an emerging field that uses the unifying scheme of finite state machine models and their complexity to tie together finite group theory, semi group theory, automata and sequential machine theory, finite-phase space physics, metabolic and evolutionary biology, epistemology mathematical theory of psychoanalysis, philosophy, and game theory.This first published edition has been edited by Chrystopher Nehaniv for the 21st century, and sets the stage for the application of algebraic-automata theory to areas outside mathematics. Its novel and rigorous development of the mathematical theory of complexity via algebraic automata theory reveals deep and unexpected connections between algebra (semigroups) and areas of science, and engineering.The material and references have been brought up to date by the editor as much as possible, yet the book retains its distinct character and. the bold yet rigorous style of the author. The approach and contents will be of interest to a variety of researchers and students in algebra as well as to the diverse, growing areas of applications of algebra in science and engineering.

Learning MATLAB


Tobin A. Driscoll - 2009
    It can be used as the primary text for a short course, as a companion textbook for a numerical computing course, or for self-study. The presentation is designed to guide a new MATLAB user through the basics of interacting with and programming in the MATLAB software, and into some of the more important advanced techniques, including the solution of common problem types in scientific computing. Rather than including exhaustive technical syntax material, this book aims to teach through readily understood examples and numerous exercises that range from straightforward to very challenging. Learning MATLAB is ideal for readers seeking a focused and brief approach to the software, rather than an encyclopedic one.

Pro JPA 2: Mastering the Java Persistence API


Merrick Schincariol - 2009
    JPA provides Java developers with both the knowledge and insight needed to write Java applications that access relational databases through JPA.Authors "Mike Keith " and "Merrick Schincariol " take a handson approach to teaching by giving examples to illustrate each new concept of the API and showing how it is used in practice. All of the examples use a common model from an overriding sample application, giving readers a context from which to start and helping them to understand the examples within an already familiar domain.After completing the book, you will have a full understanding and be able to successfully code applications using JPA. The book also serves as a reference guide during initial and later JPA application experiences.Hands-on examples for all the aspects of the JPA specification, based on the reference implementation of this specification A special section on migration to JPA Expert insight about various aspects of the API and when they are useful Portability hints to provide increased awareness of the potential for nonportable JPA code "What youll learn "Get started with enterprise applications using JPA 2. Get up to speed with ObjectRelational Mapping and Entity Manager. Learn and use queries and the query language (JP QL). Employ advanced ObjectRelational Mapping techniques. Use XML mapping files and learn other advanced techniques. Package and deploy your Java persistence applications. Test your Java persistence applications. Migrate your Java persistence applications. "Who this book is for "The book generally targets enterprise and persistence developers who fall in one of three categories: Those who are new to persistence; we will present some background information and introduce these readers to the basic persistence concepts to bring them up to speed. Those who know and/or use existing ORM persistence products such as Hibernate or TopLink. Those who have already used JPA and want to learn about the new features that JPA 2 introduces, or have a good reference book to turn to when they develop JPA applications.In general, we assume that the reader is knowledgeable with Java, SQL, and JDBC, and has a little knowledge of J2EE "Table of Contents "IntroductionGetting StartedEnterprise ApplicationsObject-Relational MappingCollection MappingEntity ManagerUsing QueriesQuery LanguageCriteria APIAdvanced Object-Relational MappingAdvanced TopicsXML Mapping FilesPackaging and DeploymentTestingMigration

A Primer of Ecology with R


M. Henry H. Stevens - 2009
    Provides simple explanations of the important concepts in population and community ecology.Provides R code throughout, to illustrate model development and analysis, as well as appendix introducing the R language.Interweaves ecological content and code so that either stands alone.Supplemental web site for additional code.

Big Java: Compatible with Java 5, 6 and 7, 4th Edition


Cay S. Horstmann - 2009
    Realistic programming examples, homework assignments, and lab exercises build student problem-solving abilities. The book includes a set of advanced chapters that makes the book suitable for a 2-semester course sequence, or as a comprehensive reference to programming in Java. The homework package includes a great quantity and variety of problem types and the LabRat tool in WileyPLUS permits automated submission and grading of programming assignments.

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System


Bill Blunden - 2009
    Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0

Principles of Digital Image Processing: Fundamental Techniques (Undergraduate Topics in Computer Science)


Wilhelm Burger - 2009
    It concentrates on practical applications and working implementations whilst also presenting important formal details and the necessary mathematics. Full description

Guide to Research Techniques in Neuroscience


Matt Carter - 2009
    A single topic such as the auditory system can be studied using techniques from genetics, imaging, biochemistry, or electrophysiology. A young scientist must learn how to read the primary literature and then develop their own experiments. This book offers that scientist an overview of mainstream research techniques, provides guidelines on how to choose one technique over another, offers tips on analyzing data, and provides a list of references for additional detailed study. This book can also assist an experienced scientist understand published studies conducted outside their own subfield.

CompTIA Network+ N10-004 Exam Cram


Mike Harwood - 2009
     Covers the critical information you’ll need to know to score higher on your Network+ exam! Implement proven best practices for managing networks efficiently and reliably Thoroughly understand network hardware components, devices, cabling, and connectors Systematically review TCP/IP, related network protocols, and the OSI model Manage network operating systems and clients Identify network vulnerabilities and configure network security to address them Use security tools such as cryptography and antivirus software Provide reliable, secure Internet access, WAN access, and VLAN support Implement disaster recovery plans that protect business continuity Troubleshoot network and Internet connectivity problems Efficiently document the network and provide high-quality user support CD Features Test Engine! Detailed explanations of correct and incorrect answers Multiple test modes Random questions and order of answers Coverage of each Network+ exam objective

Android Programming Tutorials


Mark L. Murphy - 2009
    Android Programming Tutorials gives you hands-on instruction in how to build sophisticated Android applications, using many of the technologies outlined in CommonsWare's other Android books. These exercises lead you through the basics of creating Android applications, all the way through many fun Android features like Internet access, location tracking, maps, integrated WebKit browsers, cameras, accelerometers, home screen widgets, and much more. Full source code to all the exercise answers is available, to help you if you get stuck. Android Programming Tutorials makes an excellent companion volume to more traditional Android books that merely tell you what is possible.

Foundations of Semantic Web Technologies


Pascal Hitzler - 2009
    While Semantic Web technologies are still rapidly evolving, Foundations of Semantic Web Technologies focuses on the established foundations in this area that have become relatively stable over time. It thoroughly covers basic introductions and intuitions, technical details, and formal foundations.The book concentrates on Semantic Web technologies standardized by the World Wide Web Consortium: RDF and SPARQL enable data exchange and querying, RDFS and OWL provide expressive ontology modeling, and RIF supports rule-based modeling. The text also describes methods for specifying, querying, and reasoning with ontological information. In addition, it explores topics that are clearly beyond foundations, such as tools, applications, and engineering aspects.Written by highly respected researchers with a deep understanding of the material, this text centers on the formal specifications of the subject and supplies many pointers that are useful for employing Semantic Web technologies in practice.The book has an accompanying website with supplemental information.

Exploratory Search: Beyond the Query-Response Paradigm


Ryen White - 2009
    Information seeking is the process or activity of attempting to obtain information in both human and technological contexts. Exploratory search describes an information-seeking problem context that is open-ended, persistent, and multifaceted, and information-seeking processes that are opportunistic, iterative, and multitactical. Exploratory searchers aim to solve complex problems and develop enhanced mental capacities. Exploratory search systems support this through symbiotic human-machine relationships that provide guidance in exploring unfamiliar information landscapes. Exploratory search has gained prominence in recent years. There is an increased interest from the information retrieval, information science, and human-computer interaction communities in moving beyond the traditional turn-taking interaction model supported by major Web search engines, and toward support for human intelligence amplification and information use. In this lecture, we introduce exploratory search, relate it to relevant extant research, outline the features of exploratory search systems, discuss the evaluation of these systems, and suggest some future directions for supporting exploratory search. Exploratory search is a new frontier in the search domain and is becoming increasingly important in shaping our future world. Table of Contents: Introduction / Defining Exploratory Search / Related Work / Features of Exploratory Search Systems / Evaluation of Exploratory Search Systems / Future Directions and concluding Remarks

Channel Codes: Classical and Modern


William E. Ryan - 2009
    Known for their writing clarity, Professors Ryan and Lin provide the latest information on modern channel codes, including turbo and low-density parity-check (LDPC) codes. They also present detailed coverage of BCH codes, Reed-Solomon codes, convolutional codes, finite geometry codes, and product codes, providing a one-stop resource for both classical and modern coding techniques. Assuming no prior knowledge in the field of channel coding, the opening chapters begin with basic theory to introduce newcomers to the subject. Later chapters then extend to advanced topics such as code ensemble performance analyses and algebraic code design. 250 varied and stimulating end-of-chapter problems are also included to test and enhance learning, making this an essential resource for students and practitioners alike.

Lab Manual for Ciampa S Security+ Guide to Network Security Fundamentals, 3rd


Paul Cretaro - 2009
    This lab manual, when used with the main text, "Security+ Guide to Network Security Fundamentals, Third Edition" will maximize students' successes on CompTIA's Security+ certification exam.

Cognitive Ecology II


Reuven Dukas - 2009
    Research in cognitive ecology has expanded rapidly in the past decade, and this second volume builds on the foundations laid out in the first, published in 1998. Cognitive Ecology II integrates numerous scientific disciplines to analyze the ecology and evolution of animal cognition. The contributors cover the mechanisms, ecology, and evolution of learning and memory, including detailed analyses of bee neurobiology, bird song, and spatial learning. They also explore decision making, with mechanistic analyses of reproductive behavior in voles, escape hatching by frog embryos, and predation in the auditory domain of bats and eared insects. Finally, they consider social cognition, focusing on alarm calls and the factors determining social learning strategies of corvids, fish, and mammals. With cognitive ecology ascending to its rightful place in behavioral and evolutionary research, this volume captures the promise that has been realized in the past decade and looks forward to new research prospects.

ShaderX7: Advanced Rendering Techniques


Wolfgang Engel - 2009
    the latest volume in the cuttingedge.indispensable series for game and graphics programmers.This all-new volume ispacked with a collection of insightful techniques. innovative solutions to commonproblems. and practical tools and tricks that provide you with a complete shaderprogramming toolbox. Every article was developed from the research and experiencesof industry pros and edited by shader experts. resulting in unbiased coverage of allhardware and developer tools.ShaderX7 provides coverage of the vertex and pixel shader methods used in high-endgraphics and game development.These state-of-the-art. ready-to-use solutions will helpyou meet your daily programming challenges and ing your graphics to a new levelof realism.This collection offers time-saving solu...

Computer Networking for LANs to WANs: Hardware, Software and Security [With CDROM]


James L. Antonakos - 2009
    This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities.

Handbook of Practical Logic and Automated Reasoning


John E. Harrison - 2009
    The mathematical logic foundations are described in conjunction with practical application, all with the minimum of prerequisites. The approach is constructive, concrete and algorithmic: a key feature is that methods are described with reference to actual implementations (for which code is supplied) that readers can use, modify and experiment with. This book is ideally suited for those seeking a one-stop source for the general area of automated reasoning. It can be used as a reference, or as a place to learn the fundamentals, either in conjunction with advanced courses or for self study.

Computer Science with C++ for Class XI


Sumita Arora - 2009
    Legal to use despite any disclaimer on cover. Save Money. Contact us for any queries. Best Customer Support! All Orders shipped with Tracking Number

Ubuntu Linux Secrets


Richard Blum - 2009
    This book covers the basics of creating a new system from scratch and explains what software is installed. You'll take a tour of installing the Ubuntu Linux distribution system in most environments, including nontraditional situations such as dual-boot and text-based installations. Plus, clear explanations of each of the installed applications show you how to get the most out of each application, rather than simply using them as they exist.

Statistical Machine Translation


Philipp Koehn - 2009
    In general, statistical techniques allow automatic translation systems to be built quickly for any language-pair using only translated texts and generic software. With increasing globalization, statistical machine translation will be central to communication and commerce. Based on courses and tutorials, and classroom-tested globally, it is ideal for instruction or self-study, for advanced undergraduates and graduate students in computer science and/or computational linguistics, and researchers in natural language processing. The companion website provides open-source corpora and tool-kits.

Best of the Web 2009


Lee K. Abbott - 2009
    . . and sometimes exhilarating—not unlike the Web itself.”—Los Angeles Times“The book, which canvasses both fiction and poetry, really cooks . . . in the melding of the two genres. . . . The Internet is built for this work: short and weird, just what one’s attention span wants when clicking through. And Almond and Leslie wisely pick up on that, making the book worth paging through, as well.”—Time Out Chicago“Though publishing online provides us the opportunity to present fiction free from economic imperative, permitting us, our authors, and our readers to relish in the experiment of expression, one of our great regrets is forgoing the sensation of binding it, printing it, holding the work we proudly select in our hands. Then along comes Dzanc Books, and this gift of a book, Best of the Web, that feels, to us, like the presentation of an award.”—Aaron Petrovich and Alex Rose, editors, Hotel St. George PressThis Best of the Web anthology is the first comprehensive print anthology to represent the vast array of contemporary online literature on an annual basis, bringing the world of web journals to a greater audience.In Best of the Web 2009:Waqar Ahmed, Arlene Ang , Michael Baker, Marcelo Ballve, Marge Barrett ,Carmelinda Blagg , Benjamin Buchholz, Blake Butler, Jimmy Chen, Amy L .Clark, Amber Cook, Bill Cook, Michael Czyzniejewski, Darlin’ Neal, MatthewDerby, Ryan Dilbert , Stephen Dixon, Alex Dumont , Claudia Emerson, D.A.Feinfeld, Marcela Fuentes, M. Thomas Gammarino, Cassandra Garbus, MollyGaudr y, Anne Germanacos, Matt Getty, Todd Hasak-Lowy, Karen Heuler, AshHibbert , Philip Holden, Roy Kesey, Hari Bhajan Khalsa, Tricia Louvar, PeterMarkus, Michael Martone, Heather Killelea McEntarfer, Lindsay Merbaum,Corey Mesler, Laura Mullen, Joseph Olschner, Jeff Parker, Elise Paschen,Elizabeth Penrose, Kate Petersen, Glen Pourciau, Sam Rasnake, JonathanRice, Tom Sheehan, Claudia Smith, Lynn Strongin, Terese Svoboda, JonThompson, Davide Trame, Donna D. Vitucci, Helen Wickes, Kathrine LeoneWright , Jordan Zinovich, as well as introductions from series editor NathanLeslie and edition editor Lee K. Abbot , and interviews with select authors.

Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors


Jean-Loup Baer - 2009
    It discusses topics such as - the policies and mechanisms needed for out-of-order processing such as register renaming, reservation stations, and reorder buffers - optimizations for high performance such as branch predictors, instruction scheduling, and load-store speculations - design choices and enhancements to tolerate latency in the cache hierarchy of single and multiple processors - state-of-the-art multithreading and multiprocessing emphasizing single chip implementations Topics are presented as conceptual ideas, with metrics to assess the performance impact, if appropriate, and examples of realization. The emphasis is on how things work at a black box and algorithmic level. The author also provides sufficient detail at the register transfer level so that readers can appreciate how design features enhance performance as well as complexity.

Eleventh Hour Security+: Exam Sy0 201 Study Guide


Ido Dubrawsky - 2009
    The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.

Quantum Circuit Simulation


George F. Viamontes - 2009
    It requires only basic familiarity with algebra, graph algorithms and computer engineering. After introducing necessary background, the authors describe key simulation techniques that have so far been scattered throughout the research literature in physics, computer science, and computer engineering. Quantum Circuit Simulation also illustrates the development of software for quantum simulation by example of the QuIDDPro package, which is freely available and can be used by students of quantum information as a "quantum calculator."

Discovering Requirements


Ian Alexander - 2009
    It's also a lot of fun to read." Michael Jackson, The Open University.Do you need to know how to create good requirements?Discovering Requirements offers a set of simple, robust, and effective cognitive tools for building requirements. Using worked examples throughout the text, it shows you how to develop an understanding of any problem, leading to questions such as: What are you trying to achieve? Who is involved, and how? What do those people want? Do they agree? How do you envisage this working? What could go wrong? Why are you making these decisions? What are you assuming?The established author team of Ian Alexander and Ljerka Beus-Dukic answer these and related questions, using a set of complementary techniques, including stakeholder analysis, goal modelling, context modelling, storytelling and scenario modelling, identifying risks and threats, describing rationales, defining terms in a project dictionary, and prioritizing.This easy to read guide is full of carefully-checked tips and tricks. Illustrated with worked examples, checklists, summaries, keywords and exercises, this book will encourage you to move closer to the real problems you're trying to solve. Guest boxes from other experts give you additional hints for your projects.Invaluable for anyone specifying requirements including IT practitioners, engineers, developers, business analysts, test engineers, configuration managers, quality engineers and project managers.A practical sourcebook for lecturers as well as students studying software engineering who want to learn about requirements work in industry.Once you've read this book you will be ready to create good requirements!

A Practical Introduction to Computer Architecture


Daniel Page - 2009
    In my view, the content is unique in that it blends traditional teaching approaches with the use of mathematics and a mainstream Hardware Design Language (HDL) as formalisms to describe key concepts. The book keeps the machine separate from the application by strictly following a bottom-up approach: it starts with transistors and logic gates and only introduces assembly language programs once their execution by a processor is clearly de ned. Using a HDL, Verilog in this case, rather than static circuit diagrams is a big deviation from traditional books on computer architecture. Static circuit diagrams cannot be explored in a hands-on way like the corresponding Verilog model can. In order to understand why I consider this shift so important, one must consider how computer architecture, a subject that has been studied for more than 50 years, has evolved. In the pioneering days computers were constructed by hand. An entire computer could (just about) be described by drawing a circuit diagram. Initially, such d- grams consisted mostly of analogue components before later moving toward d- ital logic gates. The advent of digital electronics led to more complex cells, such as half-adders, ip- ops, and decoders being recognised as useful building blocks."

Conceptual Wavelets in Digital Signal Processing: An In-Depth, Practical Approach for the Non-Mathematician


D. Lee Fugal - 2009
    

Certified TYPO3 Integrator


Patrich Lobacher - 2009
    The demanding exam covers subjects such as TypoScript, Templating, Backend Administration, Basics of TYPO3-Implementation among many others. Based in style and content on the actual exam requirements, this book covers all topics relevant for your preparation in detail. It provides 250 mock exam questions along with solutions and substantiated explanations. Complete your knowledge by yourself or sign up for one of our courses to prepare yourself perfectly for the certification exam.

Exploring Bioinformatics: A Project-Based Approach


Caroline St. Clair - 2009
    Through Hands-On Projects, Students Are Introduced To Current Biological Problems And Then Explore And Develop Bioinformatic Solutions To These Issues. Each Chapter Presents A Key Problem, Provides Basic Biological Concepts, Introduces Computational Techniques To Address The Problem, And Guides Students Through The Use Of Existing Web-Based Tools And Existing Software Solutions. This Progression Prepares Students To Tackle The On-Your-Own Project, Where They Develop Their Own Software Solutions. Topics Such As Antibiotic Resistance, Genetic Disease, And Genome Sequencing Provide Context And Relevance To Capture Student Interest.

Semantics Engineering with PLT Redex


Matthias Felleisen - 2009
    Software engineers have long known that automatic tool support is critical for rapid prototyping and modeling, and this book is addressed to the working semantics engineer (graduate student or professional language designer). The book comes with a prototyping tool suite to develop, explore, test, debug, and publish semantic models of programming languages. With PLT Redex, semanticists can formulate models as grammars and reduction models on their computers with the ease of paper and pencil. The text first presents a framework for the formulation of language models, focusing on equational calculi and abstract machines, then introduces PLT Redex, a suite of software tools for expressing these models as PLT Redex models. Finally, experts describe a range of models formulated in Redex. PLT Redex comes with the PLT Scheme implementation, available free at http: //www.plt-scheme.org/. Readers can download the software and experiment with Redex as they work their way through the book.

Systems Biology


Edda Klipp - 2009
    Boxed summaries at the start of each subchapter and examples illustrated throughout the book highlight the key points and provide clarity. Most chapters conclude with a short problem set, summarising the basic concepts and prompting further thought. This clear text is a useful starting point for anyone aspiring to solve a biological question using systems biology approaches."—Phenotype, 2010Systems biology is a highly topical discipline at the intersection of biochemistry, cell biology, computer science, and systems engineering.This course book in systems biology is tailored to the needs of advanced students of biology, engineering, and computer science. It has a companion website with solutions to questions in the book, additional chapters, and computer implementations of systems biology models.The book is a follow-up of the very successful Systems Biology in Practice and incorporates the feedback and suggestions of many lecturers worldwide.The interdisciplinary team of acclaimed authors have worked closely together to ensure a comprehensive coverage of the topic in a fluent and compelling style. Further material is available on www.wiley-vch.de/home/systemsbiology Systems Biology in Practice - Praise from the reviews: "...this is one book that I bought for myself as soon as it was published."—British Journal of Occupational Therapy"This resource does an admirable job of bringing the readers to a level where they can pursue more advanced study and research."—IEEE Engineering in Medicine and Biology Magazine"… I am confident that biologists everywhere will benefit from having a copy to hand."—Theoretical Biology and Medical Modelling