Best of
Computers

1988

Concrete Mathematics: A Foundation for Computer Science


Ronald L. Graham - 1988
    "More concretely," the authors explain, "it is the controlled manipulation of mathematical formulas, using a collection of techniques for solving problems."

The AWK Programming Language


Alfred V. Aho - 1988
    In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined functions. This new version is available for both Unix and MS-DOS. This is the first book on AWK. It begins with a tutorial that shows how easy AWK is to use. The tutorial is followed by a comprehensive manual for the new version of AWK. Subsequent chapters illustrate the language by a range of useful applications, such as: Retrieving, transforming, reducing, and validating data Managing small, personal databases Text processing Little languages Experimenting with algorithms The examples illustrates the books three themes: showing how to use AWK well, demonstrating AWKs versatility, and explaining how common computing operations are done. In addition, the book contains two appendixes: summary of the language, and answers to selected exercises.

Numerical Recipes in C: The Art of Scientific Computing


William H. Press - 1988
    In a self-contained manner it proceeds from mathematical and theoretical considerations to actual practical computer routines. With over 100 new routines bringing the total to well over 300, plus upgraded versions of the original routines, the new edition remains the most practical, comprehensive handbook of scientific computing available today.

Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture


Douglas E. Comer - 1988
    Discover how the basic TCP/IP technology has survived and evolved over two decades of exponential growth, and understand the TCP/IP protocols and technical advances. This edition explains emerging technologies such as Mobile IP, Virtual Private Networks, resource reservation with RSVP, and Ipv6. Comer reveals how to master TCP/IP and how the Internet works. The reader is required to have a modest background in the fundamentals of computer systems, but does not need sophisticated mathematics. As with previous editions, this edition provides an introduction to physical networks and then shows how they are combined to form an internet. It states design principles clearly, and discusses motivations and consequences. THIS NEW EDITION OF VOLUME 1: *Explains how voice and video are sent over IP internets and how IP Telephony operates *Describes Mobile IP (a technology that allows a computer to move fr

Computer Simulation of Liquids


M.P. Allen - 1988
    The authors discuss the latest simulation techniques of molecular dynamics and the Monte Carlo methods as well as how to avoid common programming pitfalls. Theoretical concepts and practical programming advice are amply reinforced with examples of computer simulation in action and samples of Fortran code. The authors have also included a wide selection of programs and routines on microfiche to aid chemists, physicists, chemical engineers, and computer scientists, as well as graduate and advanced students in chemistry.

The Dreams of Reason: The Computer and the Rise of the Sciences of Complexity


Heinz R. Pagels - 1988
    In the provocative, enlightening style of James Gleick's Chaos, The Dreams of Reason reveals how the conjunction of the revolutionary new sciences and computer technology is changing our view of reality.

More Programming Pearls: Confessions of a Coder


Jon L. Bentley - 1988
    These techniques deal with real programs and they are realistically illustrated, using the C and Awk languages. Bentley also provides the reader with some tricks of the programmer's trade, like a collection of rules of thumb and hints for finding simple solutions to hard problems.These essays also originally appeared in the author's column in Communication of the ACM, and have been substantially revised, incorporating new sections, problems, and reader comments.

Object-Oriented Software Construction (Book/CD-ROM)


Bertrand Meyer - 1988
    A whole generation was introduced to object technology through the first edition of this book. This long-awaited new edition retains the qualities of clarity, practicality and scholarship that made the first an instant bestseller, but has been thoroughly revised and expanded.Among the new topics covered in depth are: concurrency, distribution, client/server and the Internet, object-oriented databases, design by contract, fundamental design patterns, finding classes, the use and misuse of inheritance, abstract data types, and typing issues. The book also includes completely updated discussions of reusability, modularity, software quality, object-oriented languages, memory management, and many other essential topics.

The Zen of Programming


Geoffrey James - 1988
    Will take 25-35 days

Business Data Communications


Jerry FitzGerald - 1988
    Most texts are purely managerial and fail to cover the critical technical topics, and others are extremely technical and appeal only to engineers and computer scientists. This book, on the other hand, is for managers, yet provides the technical information that is critical to an understanding of the breakthroughs in this rapidly changing field. This edition has been substantially updated and reorganized to reflect the needs of the student and includes a new chapter on voice communications, increased coverage of Wide

Information Economics: Linking Business Performance To Information Technology


Marilyn M. Parker - 1988
    Introduction to Information Economics2. Challenges and problems3. Information value in the business domain4. Information value and the technology domain5. Information economics and organizational planning6. Costs, benefits and value7. Planning methods: Linking business and information technologyPART 2: ELEMENTS OF INFORMATION ECONOMICS8. Cost-benefit analysis9. Information economic tools10. Value linking and value acceleration11. Value restructuring12. Innovation13. Business domain values and risks14. Technology domain values and risksPART 3: APPLYING INFORMATION ECONOMICS15. The basis for corporate value16. The corporate decision process17. Applying Information Economics in a corporate setting18. Summing up Information EconomicsAPPENDICESGlossary of accounting termsGeneration of monthly cash flowsBenefits, costs and risksCost curves for data-managed systemsConversion of scores to project weighted valuesReferencesIndex

The Complete Guide to Software Testing


William Hetzel - 1988
    This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing--a survey of testing practices. Dr. Hetzel first develops the concepts and principles of testing. Then he presents detailed discussions of testing techniques, methodologies and management perspectives. Each chapter contains examples, checklists and case studies based on Dr. Hetzel's consulting and management experience. These will help you understand the material and adapt it to your environment. Intended primarily for software developers, testers and managers, auditors and quality assurance specialists will find the book an invaluable aid for the development of testing standards and the evaluation of testing effectiveness. Table of Contents: Introduction. Principles of Testing. Methodology. Testing through Reviews. Testing Requirements. Testing Design. Testing Programs--Testing in the Small. Testing Systems--Testing in the Large. Testing Software Changes. Testing Software Packages. The Role of Management. Organizing the Testing Function. Controlling the Testing Function. Putting the Pieces Together. Testing Practices Survey. Sample Testing Policies. Quality Measurement Diagnostic Checklist. Testing References (Bibliography).

Modern Cryptology


Gilles Brassard - 1988
    The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.

PC Magazine DOS Power Tools with Disk: Techniques, Tricks and Utilities


Paul Somerson - 1988
    It includes dozens of undocumented tips and shortcuts, as well as sections that show how to surmount common trouble spots. Includes disk.

Explorations in Parallel Distributed Processing: A Handbook of Models, Programs, and Exercises - IBM Version


James L. McClelland - 1988
    Includes two 5 1/4" DS/DD diskettes for IBM PCs and compatibles

Computers and the Cosmos


Time-Life Books - 1988
    

The Waite Group's Microsoft C Bible


Nabajyoti Barkakati - 1988
    Each routine is preceded by a practical tutorial and categorized by function. The compatability box feature is covered.

The Unix System


Stephen R. Bourne - 1988
    

Graphic Design for the Electronic Age: Manual for Traditional and Desk Top Publishing


Jan V. White - 1988
    It covers the basic principles of effective design clearly, with an abundance of examples and practical information.