Best of
Computers
1988
Concrete Mathematics: A Foundation for Computer Science
Ronald L. Graham - 1988
"More concretely," the authors explain, "it is the controlled manipulation of mathematical formulas, using a collection of techniques for solving problems."
The AWK Programming Language
Alfred V. Aho - 1988
In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined functions. This new version is available for both Unix and MS-DOS. This is the first book on AWK. It begins with a tutorial that shows how easy AWK is to use. The tutorial is followed by a comprehensive manual for the new version of AWK. Subsequent chapters illustrate the language by a range of useful applications, such as: Retrieving, transforming, reducing, and validating data Managing small, personal databases Text processing Little languages Experimenting with algorithms The examples illustrates the books three themes: showing how to use AWK well, demonstrating AWKs versatility, and explaining how common computing operations are done. In addition, the book contains two appendixes: summary of the language, and answers to selected exercises.
Numerical Recipes in C: The Art of Scientific Computing
William H. Press - 1988
In a self-contained manner it proceeds from mathematical and theoretical considerations to actual practical computer routines. With over 100 new routines bringing the total to well over 300, plus upgraded versions of the original routines, the new edition remains the most practical, comprehensive handbook of scientific computing available today.
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture
Douglas E. Comer - 1988
Discover how the basic TCP/IP technology has survived and evolved over two decades of exponential growth, and understand the TCP/IP protocols and technical advances. This edition explains emerging technologies such as Mobile IP, Virtual Private Networks, resource reservation with RSVP, and Ipv6. Comer reveals how to master TCP/IP and how the Internet works. The reader is required to have a modest background in the fundamentals of computer systems, but does not need sophisticated mathematics. As with previous editions, this edition provides an introduction to physical networks and then shows how they are combined to form an internet. It states design principles clearly, and discusses motivations and consequences. THIS NEW EDITION OF VOLUME 1: *Explains how voice and video are sent over IP internets and how IP Telephony operates *Describes Mobile IP (a technology that allows a computer to move fr
Computer Simulation of Liquids
M.P. Allen - 1988
The authors discuss the latest simulation techniques of molecular dynamics and the Monte Carlo methods as well as how to avoid common programming pitfalls. Theoretical concepts and practical programming advice are amply reinforced with examples of computer simulation in action and samples of Fortran code. The authors have also included a wide selection of programs and routines on microfiche to aid chemists, physicists, chemical engineers, and computer scientists, as well as graduate and advanced students in chemistry.
The Dreams of Reason: The Computer and the Rise of the Sciences of Complexity
Heinz R. Pagels - 1988
In the provocative, enlightening style of James Gleick's Chaos, The Dreams of Reason reveals how the conjunction of the revolutionary new sciences and computer technology is changing our view of reality.
More Programming Pearls: Confessions of a Coder
Jon L. Bentley - 1988
These techniques deal with real programs and they are realistically illustrated, using the C and Awk languages. Bentley also provides the reader with some tricks of the programmer's trade, like a collection of rules of thumb and hints for finding simple solutions to hard problems.These essays also originally appeared in the author's column in Communication of the ACM, and have been substantially revised, incorporating new sections, problems, and reader comments.
Object-Oriented Software Construction (Book/CD-ROM)
Bertrand Meyer - 1988
A whole generation was introduced to object technology through the first edition of this book. This long-awaited new edition retains the qualities of clarity, practicality and scholarship that made the first an instant bestseller, but has been thoroughly revised and expanded.Among the new topics covered in depth are: concurrency, distribution, client/server and the Internet, object-oriented databases, design by contract, fundamental design patterns, finding classes, the use and misuse of inheritance, abstract data types, and typing issues. The book also includes completely updated discussions of reusability, modularity, software quality, object-oriented languages, memory management, and many other essential topics.
Business Data Communications
Jerry FitzGerald - 1988
Most texts are purely managerial and fail to cover the critical technical topics, and others are extremely technical and appeal only to engineers and computer scientists. This book, on the other hand, is for managers, yet provides the technical information that is critical to an understanding of the breakthroughs in this rapidly changing field. This edition has been substantially updated and reorganized to reflect the needs of the student and includes a new chapter on voice communications, increased coverage of Wide
Information Economics: Linking Business Performance To Information Technology
Marilyn M. Parker - 1988
Introduction to Information Economics2. Challenges and problems3. Information value in the business domain4. Information value and the technology domain5. Information economics and organizational planning6. Costs, benefits and value7. Planning methods: Linking business and information technologyPART 2: ELEMENTS OF INFORMATION ECONOMICS8. Cost-benefit analysis9. Information economic tools10. Value linking and value acceleration11. Value restructuring12. Innovation13. Business domain values and risks14. Technology domain values and risksPART 3: APPLYING INFORMATION ECONOMICS15. The basis for corporate value16. The corporate decision process17. Applying Information Economics in a corporate setting18. Summing up Information EconomicsAPPENDICESGlossary of accounting termsGeneration of monthly cash flowsBenefits, costs and risksCost curves for data-managed systemsConversion of scores to project weighted valuesReferencesIndex
The Complete Guide to Software Testing
William Hetzel - 1988
This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing--a survey of testing practices. Dr. Hetzel first develops the concepts and principles of testing. Then he presents detailed discussions of testing techniques, methodologies and management perspectives. Each chapter contains examples, checklists and case studies based on Dr. Hetzel's consulting and management experience. These will help you understand the material and adapt it to your environment. Intended primarily for software developers, testers and managers, auditors and quality assurance specialists will find the book an invaluable aid for the development of testing standards and the evaluation of testing effectiveness. Table of Contents: Introduction. Principles of Testing. Methodology. Testing through Reviews. Testing Requirements. Testing Design. Testing Programs--Testing in the Small. Testing Systems--Testing in the Large. Testing Software Changes. Testing Software Packages. The Role of Management. Organizing the Testing Function. Controlling the Testing Function. Putting the Pieces Together. Testing Practices Survey. Sample Testing Policies. Quality Measurement Diagnostic Checklist. Testing References (Bibliography).
Modern Cryptology
Gilles Brassard - 1988
The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.
PC Magazine DOS Power Tools with Disk: Techniques, Tricks and Utilities
Paul Somerson - 1988
It includes dozens of undocumented tips and shortcuts, as well as sections that show how to surmount common trouble spots. Includes disk.
Explorations in Parallel Distributed Processing: A Handbook of Models, Programs, and Exercises - IBM Version
James L. McClelland - 1988
Includes two 5 1/4" DS/DD diskettes for IBM PCs and compatibles
The Waite Group's Microsoft C Bible
Nabajyoti Barkakati - 1988
Each routine is preceded by a practical tutorial and categorized by function. The compatability box feature is covered.
Graphic Design for the Electronic Age: Manual for Traditional and Desk Top Publishing
Jan V. White - 1988
It covers the basic principles of effective design clearly, with an abundance of examples and practical information.