Best of
Computers
2013
High Performance Browser Networking
Ilya Grigorik - 2013
By understanding what the browser can and cannot do, you’ll be able to make better design decisions and deliver faster web applications to your users.Author Ilya Grigorik—a developer advocate and web performance engineer at Google—starts with the building blocks of TCP and UDP, and then dives into newer technologies such as HTTP 2.0, WebSockets, and WebRTC. This book explains the benefits of these technologies and helps you determine which ones to use for your next application.- Learn how TCP affects the performance of HTTP- Understand why mobile networks are slower than wired networks- Use best practices to address performance bottlenecks in HTTP- Discover how HTTP 2.0 (based on SPDY) will improve networking- Learn how to use Server Sent Events (SSE) for push updates, and WebSockets for XMPP chat- Explore WebRTC for browser-to-browser applications such as P2P video chat- Examine the architecture of a simple app that uses HTTP 2.0, SSE, WebSockets, and WebRTC
JavaScript and jQuery: Interactive Front-End Web Development
Jon Duckett - 2013
The content assumes no previous programming experience, other than knowing how to create a basic web page in HTML & CSS. You'll learn how to achieve techniques seen on many popular websites (such as adding animation, tabbed panels, content sliders, form validation, interactive galleries, and sorting data)..Introduces core programming concepts in JavaScript and jQueryUses clear descriptions, inspiring examples, and easy-to-follow diagramsTeaches you how to create scripts from scratch, and understand the thousands of JavaScripts, JavaScript APIs, and jQuery plugins that are available on the webDemonstrates the latest practices in progressive enhancement, cross-browser compatibility, and when you may be better off using CSS3If you're looking to create more enriching web experiences and express your creativity through code, then this is the book for you.This book is also available as part of a set in hardcover - Web Design with HTML, CSS, JavaScript and jQuery, 9781119038634 - and in softcover - Web Design with HTML, CSS, JavaScript and jQuery, 9781118907443.
Systems Performance: Enterprise and the Cloud
Brendan Gregg - 2013
Now, internationally renowned performance expert Brendan Gregg has brought together proven methodologies, tools, and metrics for analyzing and tuning even the most complex environments. Systems Performance: Enterprise and the Cloud focuses on Linux(R) and Unix(R) performance, while illuminating performance issues that are relevant to all operating systems. You'll gain deep insight into how systems work and perform, and learn methodologies for analyzing and improving system and application performance. Gregg presents examples from bare-metal systems and virtualized cloud tenants running Linux-based Ubuntu(R), Fedora(R), CentOS, and the illumos-based Joyent(R) SmartOS(TM) and OmniTI OmniOS(R). He systematically covers modern systems performance, including the "traditional" analysis of CPUs, memory, disks, and networks, and new areas including cloud computing and dynamic tracing. This book also helps you identify and fix the "unknown unknowns" of complex performance: bottlenecks that emerge from elements and interactions you were not aware of. The text concludes with a detailed case study, showing how a real cloud customer issue was analyzed from start to finish. Coverage includes - Modern performance analysis and tuning: terminology, concepts, models, methods, and techniques - Dynamic tracing techniques and tools, including examples of DTrace, SystemTap, and perf - Kernel internals: uncovering what the OS is doing - Using system observability tools, interfaces, and frameworks - Understanding and monitoring application performance - Optimizing CPUs: processors, cores, hardware threads, caches, interconnects, and kernel scheduling - Memory optimization: virtual memory, paging, swapping, memory architectures, busses, address spaces, and allocators - File system I/O, including caching - Storage devices/controllers, disk I/O workloads, RAID, and kernel I/O - Network-related performance issues: protocols, sockets, interfaces, and physical connections - Performance implications of OS and hardware-based virtualization, and new issues encountered with cloud computing - Benchmarking: getting accurate results and avoiding common mistakes This guide is indispensable for anyone who operates enterprise or cloud environments: system, network, database, and web admins; developers; and other professionals. For students and others new to optimization, it also provides exercises reflecting Gregg's extensive instructional experience.
Programming Elixir: Functional |> Concurrent |> Pragmatic |> Fun
Dave Thomas - 2013
You know you need concurrent applications, but also know these are almost impossible to get right. Meet Elixir, a functional, concurrent language built on the rock-solid Erlang VM. Elixir’s pragmatic syntax and built-in support for metaprogramming will make you productive and keep you interested for the long haul. This book is the introduction to Elixir for experienced programmers.Maybe you need something that’s closer to Ruby, but with a battle-proven environment that’s unrivaled for massive scalability, concurrency, distribution, and fault tolerance. Maybe the time is right for the Next Big Thing. Maybe it’s Elixir.
Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
Phil Lapsley - 2013
Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Phil Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book.
Introduction to Computation and Programming Using Python
John V. Guttag - 2013
It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of "data science" for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MIT's OpenCourseWare) and was developed for use not only in a conventional classroom but in in a massive open online course (or MOOC) offered by the pioneering MIT--Harvard collaboration edX.Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. The book does not require knowledge of mathematics beyond high school algebra, but does assume that readers are comfortable with rigorous thinking and not intimidated by mathematical concepts. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming.Introduction to Computation and Programming Using Python can serve as a stepping-stone to more advanced computer science courses, or as a basic grounding in computational problem solving for students in other disciplines.
Minecraft for Dummies
Jacob Cordeiro - 2013
With this fun and friendly beginners guide, you will quickly grasp how to play Minecraft in the three modes of game play: survival, creative, and hardcore. The easy-to-understand writing style walks you through every step of the way, from downloading the game to choosing a gaming platform to defending your creations against monsters and winning the game by defeating the Ender Dragon.Explains how to use blocks to build amazing creations and engage in gameplay with other players Details techniques for travelling across the biomes Zeroes in on playing wisely in Survival mode so you can acquire resources to maintain your health and hunger Shares tips for playing carefully in Creative mode, using your unlimited supply of resources, the ability to fly, and more Helps you play in Hardcore mode Minecraft For Dummies, Portable Edition goes where you go as you create a world you won't want to leave!
Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic
Mike Girvin - 2013
Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.
Understanding Computation: From Simple Machines to Impossible Programs
Tom Stuart - 2013
Understanding Computation explains theoretical computer science in a context you’ll recognize, helping you appreciate why these ideas matter and how they can inform your day-to-day programming.Rather than use mathematical notation or an unfamiliar academic programming language like Haskell or Lisp, this book uses Ruby in a reductionist manner to present formal semantics, automata theory, and functional programming with the lambda calculus. It’s ideal for programmers versed in modern languages, with little or no formal training in computer science.* Understand fundamental computing concepts, such as Turing completeness in languages* Discover how programs use dynamic semantics to communicate ideas to machines* Explore what a computer can do when reduced to its bare essentials* Learn how universal Turing machines led to today’s general-purpose computers* Perform complex calculations, using simple languages and cellular automata* Determine which programming language features are essential for computation* Examine how halting and self-referencing make some computing problems unsolvable* Analyze programs by using abstract interpretation and type systems
Algorithms Unlocked
Thomas H. Cormen - 2013
For anyone who has ever wondered how computers solve problems, an engagingly written guide for nonexperts to the basics of computer algorithms.
Ccent/CCNA Icnd1 100-101 Official Cert Guide
Wendell Odom - 2013
The New Edition of this Best-Selling Official Cert Guide includes Updated Content, New Exercises, 400 Practice Questions, and 90 Minutes of Video Training -- PLUS the CCENT Network Simulator Lite Edition with lab exercises. The CCENT Certification is now the only prerequisite for the CCNA Routing and Switching, CCNA Voice, CCNA Wireless, CCNA Security and CCDA Certifications. Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time. Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includesA test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly Troubleshooting sections, which help you master the complex scenarios you will face on the exam The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A free copy of the CCENT/CCNA ICND1 100-101 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches More than 90 minutes of video mentoring from the author A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time This official study guide helps you master all the topics on the CCENT/CCNA ICND1 exam, includingNetworking fundamentals Ethernet LANs and switches IPv4 addressing and subnetting Operating Cisco routers Configuring OSPF ACLs and NAT IPv6 fundamentals Wendell Odom, CCIE(R) No. 1624, is the most respected author of Cisco networking books in the world. His past titles include books on the entry-level Cisco certifications (CCENT and CCNA), the more advanced CCNP, and the industry-renowned CCIE. His books are known for their technical depth and accuracy. Wendell has worked as a network engineer, consultant, instructor, course developer, and book author, and he has produced videos, software, and blogs related to Cisco certifications. His website, with links to various study tools and resources, is at www.certskills.com. Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your exam success. Companion DVD The DVD contains more than 400 unique practice exam questions, ICND1 Network Simulator Lite software, and 90 minutes of video training. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test Pearson IT Certification Practice Test minimum system requirements: Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disc space plus 50 MB for each downloaded practice exam CCENT ICND1 Network Simulator Lite minimum system requirements:Microsoft Windows XP (SP3), Windows Vista (32-bit/64-bit) with SP1, Windows 7 (32-bit/64-bit) or Windows 8 (32-bit/64-bit, x86 processors), Mac OS X 10.6, 10.7, or 10.8 Intel Pentium III 1GHz or faster processor 512 MB RAM (1GB recommended) 1 GB hard disk space 32-bit color depth at 1024x768 resolution Adobe Acrobat Reader version 8 and above Other applications installed during installation:Adobe AIR 3.6.0 Captive JRE 6 This volume is part of the Official Cert Guide series from Cisco Press. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears. The 1 hour 14 minute presentation found at the following link was given by Wendell Odom to cover "Teaching the New CCENT ICND1 100-101 & CCNA ICND2 200-101 Exam Material." http: //bit.ly/OdomCCENTCCNA
Modern C++ Programming with Test-Driven Development: Code Better, Sleep Better
Jeff Langr - 2013
Test-driven development (TDD) is a modern software development practice that can dramatically reduce the number of defects in systems, produce more maintainable code, and give you the confidence to change your software to meet changing needs. But C++ programmers have been ignored by those promoting TDD--until now. In this book, Jeff Langr gives you hands-on lessons in the challenges and rewards of doing TDD in C++.Modern C++ Programming With Test-Driven Development, the only comprehensive treatment on TDD in C++ provides you with everything you need to know about TDD, and the challenges and benefits of implementing it in your C++ systems. Its many detailed code examples take you step-by-step from TDD basics to advanced concepts. As a veteran C++ programmer, you're already writing high-quality code, and you work hard to maintain code quality. It doesn't have to be that hard. In this book, you'll learn: how to use TDD to improve legacy C++ systems how to identify and deal with troublesome system dependencies how to do dependency injection, which is particularly tricky in C++ how to use testing tools for C++ that aid TDD new C++11 features that facilitate TDD As you grow in TDD mastery, you'll discover how to keep a massive C++ system from becoming a design mess over time, as well as particular C++ trouble spots to avoid. You'll find out how to prevent your tests from being a maintenance burden and how to think in TDD without giving up your hard-won C++ skills. Finally, you'll see how to grow and sustain TDD in your team. Whether you're a complete unit-testing novice or an experienced tester, this book will lead you to mastery of test-driven development in C++.What You Need A C++ compiler running under Windows or Linux, preferably one that supports C++11. Examples presented in the book were built under gcc 4.7.2. Google Mock 1.6 (downloadable for free; it contains Google Test as well) or an alternate C++ unit testing tool. Most examples in the book are written for Google Mock, but it isn't difficult to translate them to your tool of choice. A good programmer's editor or IDE. cmake, preferably. Of course, you can use your own preferred make too. CMakeLists.txt files are provided for each project. Examples provided were built using cmake version 2.8.9. Various freely-available third-party libraries are used as the basis for examples in the book. These include: - cURL - JsonCpp - Boost (filesystem, date_time/gregorian, algorithm, assign) Several examples use the boost headers/libraries. Only one example uses cURL and JsonCpp.
Pro ASP.NET MVC 5
Adam Freeman - 2013
It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.ASP.NET MVC 5 contains a number of advances over previous versions, including the ability to define routes using C# attributes and the ability to override filters. The user experience of building MVC applications has also been substantially improved. The new, more tightly integrated, Visual Studio 2013 IDE has been created specifically with MVC application development in mind and provides a full suite of tools to improve development times and assist in reporting, debugging and deploying your code. The popular Bootstrap JavaScript library has also now been included natively within MVC 5 providing you, the developer, with a wider range of multi-platform CSS and HTML5 options than ever before without the penalty of having to load-in third party libraries.
What you�ll learn
Gain a solid architectural understanding of ASP.NET MVC 5
Explore the entire ASP.NET MVC Framework as a cohesive whole
Learn what's new in version 5 and how best to apply these new features to your own work
See how MVC and test-driven development work in action
Capitalize on your existing knowledge quickly and easily through comparison of features in classic ASP.NET to those in ASP.NET MV
Who this book is for This book is for web developers with a basic knowledge of ASP.NET and C#who want, or need, to start using the new ASP.NET MVC 5 Framework.
Introducing Python: Modern Computing in Simple Packages
Bill Lubanovic - 2013
In addition to giving a strong foundation in the language itself, Lubanovic shows how to use it for a range of applications in business, science, and the arts, drawing on the rich collection of open source packages developed by Python fans.It's impressive how many commercial and production-critical programs are written now in Python. Developed to be easy to read and maintain, it has proven a boon to anyone who wants applications that are quick to write but robust and able to remain in production for the long haul.This book focuses on the current version of Python, 3.x, while including sidebars about important differences with 2.x for readers who may have to deal with programs in that version.
The Rails 4 Way
Obie Fernandez - 2013
It has conquered developer mindshare at startups and enterprises alike with its focus of simplicity, convention and clean, maintainable code. The latest version, Rails 4, continues the tradition of enhanced performance, security and developer productivity, with improvements that enable professional developers to focus on what matters most: delivering business value quickly and consistently.The Rails™ 4 Way is the only comprehensive, authoritative guide to delivering production-quality code with Rails 4. Pioneering Rails expert Obie Fernandez and his team of leading Rails experts illuminate the entire set of Rails APIs, along with the idioms, design approaches, and libraries that make developing applications with Rails so powerful. Drawing on their unsurpassed experience and track record, they address the real challenges development teams face, showing how to use Rails to maximize your productivity.Using numerous detailed code examples, the author systematically cover Rails key capabilities and subsystems, making this book a reference that you depend on everyday. He presents advanced Rails programming techniques that have been proven effective in day-to-day usage on dozens of production Rails systems and offers important insights into behavior-driven development and production considerations such as scalability. Dive deep into the subtleties of the asset pipeline and other advanced Rails topics such as security and scalability. The Rails 4 Way is your best guide for making Rails do exactly what you want it to do.
Real World OCaml: Functional programming for the masses
Yaron Minsky - 2013
Through the book’s many examples, you’ll quickly learn how OCaml stands out as a tool for writing fast, succinct, and readable systems code.Real World OCaml takes you through the concepts of the language at a brisk pace, and then helps you explore the tools and techniques that make OCaml an effective and practical tool. In the book’s third section, you’ll delve deep into the details of the compiler toolchain and OCaml’s simple and efficient runtime system.Learn the foundations of the language, such as higher-order functions, algebraic data types, and modulesExplore advanced features such as functors, first-class modules, and objectsLeverage Core, a comprehensive general-purpose standard library for OCamlDesign effective and reusable libraries, making the most of OCaml’s approach to abstraction and modularityTackle practical programming problems from command-line parsing to asynchronous network programmingExamine profiling and interactive debugging techniques with tools such as GNU gdb
CCNA Success: Mastering Binary Math And Subnetting
Chris Bryant - 2013
Step by step, beginning with the fundamentals, you'll learn how to solve any of the following question types quickly and efficiently:Converting Decimals to Binary StringsConverting Binary Strings to DecimalsDetermining The Number of Valid SubnetsDetermining The Number of Valid Hosts On Those SubnetsDetermining The Range of Valid IP Addresses on Any SubnetDetermining The Broadcast Address of Any SubnetSubnetting From Scratch -- YOU Perform The Subnetting!You'll be quite surprised how easy working with binary and subnetting is when you have the clearest, easily-understood techniques you'll learn from this ebook.Practice makes perfect, and with that in mind, this ebook contains over 150 practice questions, including illustrated answers for every question. I won't just give you the answer, I'll show you exactly how we arrived at the answer.You also save a lot of valuable time on exam day by knowing the quick, easy methods of solving these questions, without any fumbling around or wasting time.And to top it off, right now you get all of this for five bucks.Join the thousands of CCNA candidates who have used my methods to quickly solve binary math and subnetting questions on their exam today!Chris BryantCCIE #12933"The Computer Certification Bulldog"
Functional Programming in Java: Harnessing the Power of Java 8 Lambda Expressions
Venkat Subramaniam - 2013
You can use them to leap forward into a whole new world of programming in Java. With functional programming capabilities, which have been around for decades in other languages, you can now write elegant, concise, less error-prone code using standard Java. This book will guide you though the paradigm change, offer the essential details about the new features, and show you how to transition from your old way of coding to an improved style.In this book you’ll see popular design patterns, such as decorator, builder, and strategy, come to life to solve common design problems, but with little ceremony and effort. With these new capabilities in hand, Functional Programming in Java will help you pick up techniques to implement designs that were beyond easy reach in earlier versions of Java. You’ll see how you can reap the benefits of tail call optimization, memoization, and effortless parallelization techniques.Java 8 will change the way you write applications. If you’re eager to take advantage of the new features in the language, this is the book for you.
Markdown
David Sparks - 2013
This book demystifies Markdown, making it easy for anybody to learn. This book includes 130 pages, 27 screencasts with over one and half hours of video, and an additional hour of audio interviews. You can go from no knowledge to Markdown pro. It will change the way you write forever.
A Smarter Way to Learn JavaScript: The new approach that uses technology to cut your effort in half
Mark Myers - 2013
Master each chapter with free interactive exercises online.
Live simulation lets you see your practice code run in your browser.
2,000 lines of color-keyed sample code break it all down into easy-to-learn chunks.
Extra help through the rough spots so you're less likely to get stuck.
Tested on non-coders—including the author's technophobe wife.
Become fluent in all the JavaScript fundamentals, in half the time.
Display alert messages to the user
Gather information through prompts
Manipulate variables
Build statements
Do math
Use operators
Concatenate text
Run routines based on conditions
Compare values
Work with arrays
Run automated routines
Display custom elements on the webpage
Generate random numbers
Manipulate decimals
Round numbers
Create loops
Use functions
Find the current date and time
Measure time intervals
Create a timer
Respond to the user's actions
Swap images
Control colors on the webpage
Change any element on the webpage
Improvise new HTML markup on the fly
Use the webpage DOM structure
Insert comments
Situate scripts effectively
Create and change objects
Automate object creation
Control the browser's actions
Fill the browser window with custom content
Check forms for invalid entries
Deal with errors
Make a more compelling website
Increase user-friendliness
Keep your user engaged
Microsoft Excel 2013: Building Data Models with PowerPivot
Alberto Ferrari - 2013
Two business intelligence (BI) experts take you inside PowerPivot functionality for Excel 2013, with a focus on real world scenarios, problem-solving, and data modeling. You'll learn how to quickly turn mass quantities of data into meaningful information and on-the-job results—no programming required!- Understand the differences between PowerPivot for Self Service BI and SQL Server Analysis Services for Corporate BI- Extend your existing data-analysis skills to create your own BI solutions- Quickly manipulate large data sets, often in millions of rows- Perform simple-to-sophisticated calculations and what-if analysis- Create complex reporting systems with data modeling and Data Analysis Expressions- Share your results effortlessly across your organization using Microsoft SharePointAuthors’ note on using Microsoft Excel 2016: This book’s content was written against Excel 2013, but it is useful and valid for users of Excel 2016 too. Excel 2016 introduces several new DAX functions and an improved editor for DAX without changing any existing behavior. In other words, all of the concepts and examples explained in this book continue to work with Excel 2016.
Wireshark 101: Essential Skills for Network Analysis
Laura A. Chappell - 2013
This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a machine is infected with malware. Learning to capture and analyze communications with Wireshark will help you really understand how TCP/IP networks function. As the most popular network analyzer tool in the world, the time you spend honing your skills with Wireshark will pay off when you read technical specs, marketing materials, security briefings, and more. This book can also be used by current analysts who need to practice the skills contained in this book. In essence, this book is for anyone who really wants to know what's happening on their network.
High Performance Python: Practical Performant Programming for Humans
Micha Gorelick - 2013
Updated for Python 3, this expanded edition shows you how to locate performance bottlenecks and significantly speed up your code in high-data-volume programs. By exploring the fundamental theory behind design choices, High Performance Python helps you gain a deeper understanding of Python's implementation.How do you take advantage of multicore architectures or clusters? Or build a system that scales up and down without losing reliability? Experienced Python programmers will learn concrete solutions to many issues, along with war stories from companies that use high-performance Python for social media analytics, productionized machine learning, and more.Get a better grasp of NumPy, Cython, and profilersLearn how Python abstracts the underlying computer architectureUse profiling to find bottlenecks in CPU time and memory usageWrite efficient programs by choosing appropriate data structuresSpeed up matrix and vector computationsUse tools to compile Python down to machine codeManage multiple I/O and computational operations concurrentlyConvert multiprocessing code to run on local or remote clustersDeploy code faster using tools like Docker
Understanding and Using C Pointers
Richard Reese - 2013
With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.Difficult to master, pointers provide C with much flexibility and power—yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you’re a beginner or an experienced C or C++ programmer or developer.Get an introduction to pointers, including the declaration of different pointer typesLearn about dynamic memory allocation, de-allocation, and alternative memory management techniquesUse techniques for passing or returning data to and from functionsUnderstand the fundamental aspects of arrays as they relate to pointersExplore the basics of strings and how pointers are used to support themExamine why pointers can be the source of security problems, such as buffer overflowLearn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword
Coding the Matrix: Linear Algebra through Computer Science Applications
Philip N. Klein - 2013
Mathematical concepts and computational problems are motivated by applications in computer science. The reader learns by "doing," writing programs to implement the mathematical concepts and using them to carry out tasks and explore the applications. Examples include: error-correcting codes, transformations in graphics, face detection, encryption and secret-sharing, integer factoring, removing perspective from an image, PageRank (Google's ranking algorithm), and cancer detection from cell features. A companion web site, codingthematrix.com provides data and support code. Most of the assignments can be auto-graded online. Over two hundred illustrations, including a selection of relevant "xkcd" comics. Chapters: "The Function," "The Field," "The Vector," "The Vector Space," "The Matrix," "The Basis," "Dimension," "Gaussian Elimination," "The Inner Product," "Special Bases," "The Singular Value Decomposition," "The Eigenvector," "The Linear Program"
Microsoft Excel 2013 Power Programming with VBA
John Walkenbach - 2013
Naturally, that means John Walkenbach returns with a new edition of his bestselling VBA Programming book and covers all the methods and tools you need to know in order to program with Excel. With this comprehensive guide, Mr. Spreadsheet shows you how to maximize your Excel experience using professional spreadsheet application development tips from his own personal bookshelf.Featuring a complete introduction to Visual Basic for Applications and fully updated for the latest features of Excel 2013, this essential reference includes an analysis of Excel application development and is packed with procedures, tips, and ideas for expanding Excel's capabilities with VBA.Offers an analysis of Excel application development and a complete introduction to VBA Features invaluable advice from Mr. Spreadsheet himself, bestselling author John Walkenbach, who demonstrates all the techniques you need to create Excel applications, both large and small Covers navigating the Excel interface, formatting worksheets, interacting with other Office applications, working with collaboration tools, and using sample workbooks and John Walkenbach's award-winning Power Utility Pak to help enhance your Excel skills Provides tips, tricks, and techniques for expanding Excel's capabilities with VBA that you wont find anywhere else Excel 2013 Power Programming with VBA is packed with procedures, tips, and ideas for achieving Excel excellence with VBA.
CCNA Success: Chris Bryant's ICND1 Study Guide
Chris Bryant - 2013
and much, much more! Let's hear from just a few of the thousands of CCNAs and CCENTs who have used my Study Guides to make their professional dreams come true! "I just passed my CCNA using your book. I can't wait to start the CCNA Security! You really make the material fun and easy to understand." -- Matthew Fabian, Stratford, Connecticut, CCNA! "I just earned my CCNA with a 902! Thank you, Chris!" - James Bell, Norcross, Georgia, CCNA! "Just thought I'd let you know that today I passed my CCNA! Now on to the CCNP!" -- Ben Gooder, Manchester, UK, CCNA! "Thank you so much for the Bryant Advantage! I am delighted to have passed the CCNA today. I found your study guide after failing the exam twice. I passed it the third time! . Your learning tools made all the difference." -- Dene Nelson, Cathedral City, California, CCNA! From my famous, crystal-clear explanations and demos of binary math and subnetting to the clear instruction you'll receive on the dreaded topic of IP Version 6, you'll find my ICND1 Study Guide to be an invaluable part of your CCENT and CCNA success preparation. Thanks for reading this, and for making The Bryant Advantage part of your success Chris Bryant CCIE #12933 "The Computer Certification Bulldog"
Microsoft Excel 2013: Data Analysis and Business Modeling
Wayne L. Winston - 2013
Written by award-winning educator Wayne Winston, this hands-on, scenario-focused guide shows you how to use the latest Excel tools to integrate data from multiple tables—and how to effectively build a relational data source inside an Excel workbook.Solve real business problems with Excel—and sharpen your edgeSummarize data with PivotTables and Descriptive StatisticsExplore new trends in predictive and prescriptive analyticsUse Excel Trend Curves, multiple regression, and exponential smoothingMaster advanced Excel functions such as OFFSET and INDIRECTDelve into key financial, statistical, and time functionsMake your charts more effective with the Power View toolTame complex optimization problems with Excel SolverRun Monte Carlo simulations on stock prices and bidding modelsApply important modeling tools such as the Inquire add-in
CCNA Success: Chris Bryant's ICND2 Study Guide
Chris Bryant - 2013
and much, much more! Let's hear from just a few of the thousands of CCNAs and CCENTs who have used my Study Guides to make their professional dreams come true! "I just passed my CCNA using your book. I can't wait to start the CCNA Security! You really make the material fun and easy to understand." -- Matthew Fabian, Stratford, Connecticut, CCNA! "I just earned my CCNA with a 902! Thank you, Chris!" - James Bell, Norcross, Georgia, CCNA! "Just thought I'd let you know that today I passed my CCNA! Now on to the CCNP!" -- Ben Gooder, Manchester, UK, CCNA! "Thank you so much for the Bryant Advantage! I am delighted to have passed the CCNA today. I found your study guide after failing the exam twice. I passed it the third time! . Your learning tools made all the difference." -- Dene Nelson, Cathedral City, California, CCNA! From my famous, crystal-clear explanations and demos of binary math and subnetting to the clear instruction you'll receive on the dreaded topic of IP Version 6, you'll find my ICND2 Study Guide to be an invaluable part of your CCENT and CCNA success preparation. Thanks for reading this, and for making The Bryant Advantage part of your success! Chris Bryant CCIE #12933 "The Computer Certification Bulldog"
Minecraft Handbook 2: The Redstone Handbook
Mojang - 2013
It's time to wire up and get connected to one of the most complex areas of the Minecraft universe - Redstone.Minecraft experts guide you through all aspects of working with Redstone, including: mining, smelting, using repeaters, circuit components, and circuit designs.This comprehensive guide also includes exclusive tips from game creator 'Notch', as well as some of the most extraordinary Redstone creations ever made.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
C++ Templates: The Complete Guide
David Vandevoorde - 2013
In C++ Templates, Second Edition, three pioneering C++ experts show why, when, and how to use modern templates to build software that’s cleaner, faster, more efficient, and easier to maintain. Now extensively updated for the C++11, C++14, and C++17 standards, this new edition presents state-of-the-art techniques for a wider spectrum of applications. The authors provide authoritative explanations of all new language features that either improve templates or interact with them, including variadic templates, generic lambdas, class template argument deduction, compile-time if, forwarding references, and user-defined literals. They also deeply delve into fundamental language concepts (like value categories) and fully cover all standard type traits. The book starts with an insightful tutorial on basic concepts and relevant language features. The remainder of the book serves as a comprehensive reference, focusing first on language details and then on coding techniques, advanced applications, and sophisticated idioms. Throughout, examples clearly illustrate abstract concepts and demonstrate best practices for exploiting all that C++ templates can do. Understand exactly how templates behave, and avoid common pitfalls Use templates to write more efficient, flexible, and maintainable software Master today’s most effective idioms and techniques Reuse source code without compromising performance or safety Benefit from utilities for generic programming in the C++ Standard Library Preview the upcoming concepts feature
It's behind you - The making of a computer Game
Bob Pape - 2013
Jump forward to a couple of years ago (ouch, sorry) and I found myself starting to write down what I could remember about those early game years - not through any need to see my name in print but just because I thought it best to record for myself what I could while I could. I did think that if I was lucky I'd remember a few pages worth of material and come up with an interesting essay I could read back to myself when I'm an OAP (only eleven years away now!) but the more I started to think about things the more the details came back to me and the more and more pages I started to fill. Since I've always wanted to write a book and Rule Number One is "write about what you know" I decided to go for it and do things properly and write down every part of the process of creating one of those early computer games I could remember. IT'S BEHIND YOU is the result.Since R-Type was only the second published game that I had written I decided to flesh things out a bit (alright, pad things out a bit) by writing about how I got to that stage so the book itself is in three parts: a pre-history of some of my early attempts at computer game\programming, a short section on my first published game (a conversion of the Bally Midway arcade game Rampage) and R-Type itself. This last section is itself split into two parts: everything I could remember about about the writing of the game from start to finish and what happened to it, and me, after it was published.I don't believe anyone who was actually there has ever documented something like this before, and let's be honest it's really quite a niche subject with a limited appeal so I have no illusions that what I've written will only really be of interest to those who share a passion for old computer games (or 'retrocomputing' to give it its fashionable title.) Of course it does help to have an inkling of what I'm talking about when I mention the games, companies, magazines, people etc. who were part of the UK games industry at that time but I'm guessing that if you're thinking of downloading and reading this then you already have some idea of what it's all about.Lastly I hope I've done my best to try and make this as readable and non-technical as I can because behind the game is what I think is one heck of a story that I hope you'll find both interesting and illuminating.
Learn to Code HTML and CSS: Develop and Style Websites
Shay Howe - 2013
This book, based on Shay Howe's popular workshop covers the basics and breaks down the barrier to entry, showing readers how they can start using HTML and CSS through practical techniques today. They'll find accompanying code examples online, while they explore topics such as the different structures of HTML and CSS, and common terms. After establishing a basic understanding of HTML and CSS a deeper dive is taken into the box model and how to work with floats. The book includes an exercise focused on cleaning up a web page by improving the user interface and design, solely using HTML and CSS. With a few quick changes the web page changes shape and comes to life. Interactive, technically up-to-the-minute and easy-to-understand, this book will advance a student's skills to a professional level.
CCNA Routing and Switching Portable Command Guide (ICND1 100-105, ICND2 200-105, and CCNA 200-125)
Scott Empson - 2013
The CCNA Routing and Switching Portable Command Guide, Third Edition, is filled with valuable, easy-to-access information and is portable enough for use whether you're in the server room or the equipment closet. The guide summarizes all CCNA certification-level Cisco IOS(R) Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in simple network designs. This book has been completely updated to cover topics in the ICND1 100-101, ICND2 200-101, and CCNA 200-120 exams. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA Routing and Switching certification exam. The book is organized into these parts: - Part I TCP/IP v4 - Part II Introduction to Cisco Devices - Part III Configuring a Router - Part IV Routing - Part V Switching - Part VI Layer 3 Redundancy - Part VII IPv6 - Part VIII Network Administration and Troubleshooting - Part IX Managing IP Services - Part X WANs - Part XI Network SecurityQuick, offline access to all CCNA Routing and Switching commands for research and solutions Logical how-to topic groupings for a one-stop resource Great for review before CCNA Routing and Switching certification exams Compact size makes it easy to carry with you, wherever you go "Create Your Own Journal" section with blank, lined pages allows you to personalize the book for your needs "What Do You Want to Do?" chart inside back cover helps you to quickly reference specific tasks
Rig It Right! Maya Animation Rigging Concepts
Tina O'Hailey - 2013
Move from a bi-pedal character to a quad- or poly-pedal and, well, things just got real. Where do you begin?Unlike all of those button-pushing manuals out there, Rig it Right! breaks down rigging so that you can achieve a fundamental understanding of the concept, allowing you to rig more intuitively in your own work. Veteran animation professor Tina O'Hailey will get you up and rigging in a matter of hours with step-by-step tutorials covering multiple animation control types, connection methods, interactive skinning, BlendShapes, edgeloops, and joint placement, to name a few. The concept of a bi-ped is explored as a human compared to a bird character allowing you to see that a bi-ped is a bi-ped and how to problem solve for the limbs at hand. After you have moved beyond basic bi-pedal characters, Rig it Right! will take you to a more advanced level where you will learn how to create stretchy rigs with invisible control systems and use that to create your own types of rigs.
Open: How Compaq Ended IBM's PC Domination and Helped Invent Modern Computing
Rod Canion - 2013
Just four years later, Compaq was on the Fortune 500 list, and, two years after that, they had exceeded $1 billion in annual revenue. No company had ever achieved these milestones so rapidly.But few know the story behind the story. In 1982, when Compaq was founded, there was no software standardization, so every brand of personal computer required its own unique application software. Just eight years later, compatibility with the open PC standard had become ubiquitous, and it has continued to be for over two decades.This didn’t happen by accident. Cofounder and then CEO Rod Canion and his team made a series of risky and daring decisions—often facing criticism and incredulity—that allowed the open PC standard marketplace to thrive and the incredible benefits of open computing to be realized.A never-before-published insider account of Compaq’s extraordinary strategies and decisions, Open provides valuable lessons in leadership in times of crisis, management decision-making under the pressure of extraordinary growth, and the power of a unique, pervasive culture.Open tells the incredible story of Compaq’s meteoric rise from humble beginnings to become the PC industry leader in just over a decade. Along the way, Compaq helped change the face of computing while establishing the foundation for today’s world of tablets and smart phones.
Rendering in Sketchup: From Modeling to Presentation for Architecture, Landscape Architecture, and Interior Design
Daniel Tal - 2013
The book serves as a beginner rendering manual and reference guide to further develop rendering skills. With an emphasis on step-by-step process, SketchUp users learn a universal approach to rendering varied SketchUp projects, including architecture, interiors, and site design models.The book focuses on tasks and principles at the core of photorealistic rendering, including:Rendering process: Learn a step-by-step process focused on workflow within SketchUp's familiar workspace.Universal method: Understand how the process can be used to work with a variety of different integrated rendering programs, including Shaderlight, SU Podium and Twilight Render**. These programs are easy to learn and function in SketchUp. // >Textures and materials: Discover how to obtain, apply and edit texture images representing surfaces.Component details: Learn how to acquire and organize model details to allow for rich, expressive settings while maintaining computer and SketchUp performance.Exterior and simulated lighting: Learn to set exterior lighting with the SketchUp's Shadow menu or illuminate a scene with simulated lights, lamps, and bulbs.Render settings: Use specific settings for various rendering programs to quickly set texture character, image quality, and graphic output.Computer specifications: Find out how computers produce renders and the type of computer hardware required to streamline the process.Photoshop post-processing: Learn how to further refine rendered images in Photoshop.**Free online chapters: The book reviews specific settings for SketchUp and the rendering plug-in Shaderlight. Given the ever-changing nature of technology, free, online accompanying chapters detail settings for additional integrated rendering programs including SU Podium, Twilight Render, and more.
High Performance Drupal: Fast and Scalable Designs
Jeff Sheltren - 2013
You’ll learn how to apply coding and infrastructure techniques to Drupal internals, application performance, databases, web servers, and performance analysis.Covering Drupal versions 7 and 8, this book is the ideal reference for everything from site deployment to implementing specific technologies such as Varnish, memcache, or Solr. If you have a basic understanding of Drupal and the Linux-Apache-MySQL-PHP (LAMP) stack, you’re ready to get started.Establish a performance baseline and define goals for improvementOptimize your website’s code and front-end performanceGet best and worst practices for customizing Drupal core functionalityApply infrastructure design techniques to launch or expand a siteUse tools to configure, monitor, and optimize MySQL performanceEmploy alternative storage and backend search options as your site growsTune your web servers through httpd and PHP configurationMonitor services and perform load tests to catch problems before they become critical
Python for Biologists: A Complete Programming Course for Beginners
Martin O. Jones - 2013
Python for biologists is a complete programming course for beginners that will give you the skills you need to tackle common biological and bioinformatics problems. Why learn programming? Maybe you see colleagues writing programs to save time and deal with large datasets. Maybe your supervisor has told you that you need to learn programming for your next project. Maybe you've been looking at job ads and noticed just how many of them are asking for programming skills. Table of contentsIn chapter one, you'll learn why Python is a good choice for biologists and beginners alike. You'll also learn how to install Python for your operating system and how to set up your programming environment, complete with links to all the free software you'll need. In chapter two, you'll learn how to manipulate text (including DNA and protein sequences) and how to fix errors in your programs. Exercises: calculating AT content, splicing introns. In chapter three, you'll learn how to read and write data to and from files. You'll also learn how to deal with file paths and the FASTA file format.Exercises: splitting genomic DNA, writing a FASTA file. In chapter four, you'll learn how to process many pieces of data in a single program and more advanced tools for sequence manipulation. Exercises: trimming adapter sequences, concatenating exons. In chapter five, you'll learn how to make Python even more useful by creating your own functions, including the best ways to test those functions in order to speed up development. Exercises: Analyzing the amino acid composition of protein sequences. In chapter six, you'll learn how to write programs that can make smart decisions about how to handle data and how to make your programs follow complex rules. Exercises: filtering genes based on multiple criteria. In chapter seven, you'll learn an incredibly powerful tool for working with patterns in text - regular expressions - and how to use it to search in DNA and protein sequences. Exercises: filtering accession names and calculating restriction fragment sizes. In chapter eight, you'll learn how to store huge amounts of data in a way that can still allows it to be retrived very efficiently. This allows simplification of much of the code from previous chapters. Exercises: translating DNA sequences to protein. In chapter nine, you'll learn how to make your Python programs work in harmony with existing tools, and how to polish up your programs so that they're ready for other people to use. Exercises: counting k-mers, binning DNA sequences by length. About the author Dr. Martin Jones has been teaching biologists to write software for over five years and has taught everyone from postgraduates to PIs. He is currently Lecturer in Bioinformatics at Edinburgh University.
Sophistication and Simplicity: The Life and Times of the Apple II Computer
Steven Weyhrich - 2013
enjoys unprecedented popularity and prosperity with its products, routinely selling over a million devices in a single day. It is a major innovator in the computing and consumer landscape, and as shown in this retrospective, the history of the Apple II computer plays a large part in the current successes of the company. The late 1970s saw the dawn of the Apple II, the company's first hit product. It provided the breathing room for Apple to become self-sustaining and ultimately blossom into one of the greatest business and technology successes in history. This account provides a unique view of early personal computing and Apple as a company, focusing almost exclusively on the role of the Apple II within that story. It extends outward to the products, publications, and early online services that made up the ecosystem for the platform during its active years, and follows the story to present-day enthusiasts who still find new things to do with a computer that got its start more than 35 years ago.
Running A Web Design Business From Home: How To Get Clients, Keep Good Clients and Make Money with Your Home Business
Rob Cubbon - 2013
Working for a design company? Freelancing? Under-utilised, unappreciated or uninspired? This could be the book for you.Would you like to build websites for clients directly instead of going through middlemen? Would you like to work when you'd like, on what you'd like, and with whom you'd like? This could be the book for you.This book explains how to set up your business from home – the hardware and software you'll need. How to get clients – long term, quality clients that will recommend you and give you ongoing work. How to run web design projects. And how to diversify your business going forward.This is not a "get rich quick" book. You are encouraged to start in your spare time and slowly but surely build up your long-term professional contacts and online authority. This will provide you with a solid base for whatever you want to achieve with your online business in the future.
Sew Electric
Leah Buechley - 2013
The book walks you through the process of designing and making a series of quirky customizable projects including a sparkling bracelet, a glow in the dark bookmark, a fabric piano, and a monster that sings when you hold its hands. Play with cutting-edge technologies and learn sewing, programming, and circuit design along the way. It's a book for all ages. Explore the projects with your friends, your parents, your kids, or your students!
The Synthesizer: A Comprehensive Guide to Understanding, Programming, Playing, and Recording the Ultimate Electronic Music Instrument
Mark Vail - 2013
From that point, synthesizers have undergone a remarkable evolution fromprohibitively large mid-century models confined to university laboratories to the development of musical synthesis software that runs on tablet computers and portable media devices.Throughout its history, the synthesizer has always been at the forefront of technology for the arts. In The Synthesizer: A Comprehensive Guide to Understanding, Programming, Playing, and Recording the Ultimate Electronic Music Instrument, veteran music technology journalist, educator, and performerMark Vail tells the complete story of the synthesizer: the origins of the many forms the instrument takes; crucial advancements in sound generation, musical control, and composition made with instruments that may have become best sellers or gone entirely unnoticed; and the basics and intricacies ofacoustics and synthesized sound. Vail also describes how to successfully select, program, and play a synthesizer; what alternative controllers exist for creating electronic music; and how to stay focused and productive when faced with a room full of instruments. This one-stop reference guide on allthings synthesizer also offers tips on encouraging creativity, layering sounds, performance, composing and recording for film and television, and much more.
Office 2013: The Missing Manual
Nancy Conner - 2013
This helpful guide gets you started with the programs in Office 2013, and provides lots of power-user tips and tricks when you’re ready for more. You’ll learn about Office’s new templates and themes, touchscreen features, and other advances, including Excel’s Quick Analysis tool.The important stuff you need to know:Create professional-looking documents. Use Word to craft reports, newsletters, and brochures for the Web and desktop.Stay organized. Set up Outlook to track your email, contacts, appointments, and tasks.Work faster with Excel. Determine the best way to present your data with the new Quick Analysis tool.Make inspiring presentations. Build PowerPoint slideshows with video and audio clips, charts and graphs, and animations.Share your Access database. Design a custom database and let other people view it in their web browsers.Get to know the whole suite. Use other handy Office tools: Publisher, OneNote, and a full range of Office Web Apps.Create and share documents in the cloud. Upload and work with your Office files in Microsoft’s SkyDrive.
The Unauthorized Guide to iPhone, iPad, and iPod Repair: A DIY Guide to Extending the Life of Your Idevices!
Timothy L. Warner - 2013
Warner demystifies everything about iDevice repair, presenting simple, step-by-step procedures and hundreds of crisp, detailed, full-color photos.He'll walk you through safely taking apart your iDevice, replacing what's broken, and reliably reassembling it. You'll learn where to get the tools and exactly how to use them. Warner even reveals sources for broken Apple devices you can fix at low cost--for yourself, or even for resale!Replace All These iDevice Components: - Battery- Display- SIM card- Logic board- Dock connectorTake Apart, Fix, and Reassemble: - iPod nano (5th & 7th Gen)- iPod touch (4th & 5th Gen)- iPhone (3GS, 4, 4S, & 5)- iPad (iPad 2, iPad 4th Gen, & iPad mini)Fix Common Software-Related Failures: - Emergency data recovery- Jailbreaking- Carrier unlockingDo What Apple Never Intended: - Resurrect a waterlogged iDevice- Prepare an iDevice for resale- Install non-Apple Store apps- Perform out-of-warranty repairs All technical content reviewed & approved by iFixit, world leader in iDevice parts, tools, and repair tutorials!
Memory Machines: The Evolution of Hypertext
Belinda Barnet - 2013
Barnet combines an analysis of contemporary literature with her exclusive interviews with those at the forefront of the hypertext innovation. She tells both the human and the technological story, tracing its path back to an analogue device imagined by Vannevar Bush in 1945, before modern computing had happened.'Memory Machines' offers an expansive record of hypertext over the last 60 years, pinpointing the major breakthroughs and fundamental flaws in its evolution. Barnet argues that some of the earliest hypertext systems were more richly connected and in some respects more flexible than the Web; this is also a fascinating account of the paths not taken.Barnet ends the journey through computing history at the birth of mass domesticated hypertext, at the point that it grew out of the university labs and into the Web. And yet she suggests that hypertext may not have completed its evolutionary story, and may still have the capacity to become something different, something much better than it is today.
Pioneer Programmer: Jean Jennings Bartik and the Computer That Changed the World
Jean Jennings Bartik - 2013
Betty Jean Jennings (Bartik), a twenty-year-old college graduate from rural northwest Missouri, wanted an adventure, so she applied for the job. She was hired as a "computer" to calculate artillery shell trajectories for Aberdeen Proving Ground, and later joined a team of women who programmed the Electronic Numerical Integrator And Computer (ENIAC), the first successful general-purpose programmable electronic computer. In 1947, Bartik headed up a team that modified the ENIAC into the first stored-program electronic computer.Even with her talents, Bartik met obstacles in her career due to attitudes about women's roles in the workplace. Her perseverance paid off and she worked with the earliest computer pioneers and helped launch the commercial computer industry. Despite their contributions, Bartik and the other female ENIAC programmers have been largely ignored. In the only autobiography by any of the six original ENIAC programmers, Bartik tells her story, exposing myths about the computer's origin and properly crediting those behind the computing innovations that shape our daily lives.
Faust 2.0
Michael Brookes - 2013
A new entity is born into the internet.Is it the rebirth of an ancient evil in a new realm? Or something much worse?A sexy looking avatar grants wishes for people across the web, but nothing is truly free, and for those who accept, what price must be paid?Sarah Mitchell must discover the truth of this creature and stop it while it can still be stopped, but why is a mysterious lawyer dogging her every step?Faust 2.0 is the first book in the new Mitchell & Morton series.
OpenGL SuperBible: Comprehensive Tutorial and Reference
Graham Sellers - 2013
The best all-around introduction to OpenGL for developers at all levels of experience, it clearly explains both the newest API and indispensable related concepts. You'll find up-to-date, hands-on guidance for all facets of modern OpenGL development on both desktop and mobile platforms, including transformations, texture mapping, shaders, buffers, geometry management, and much more. Extensively revised, this edition presents many new OpenGL 4.3 features, including compute shaders, texture views, indirect draws, and enhanced API debugging. It has been reorganized to focus more tightly on the API, to cover the entire pipeline earlier, and to help you thoroughly understand the interactions between OpenGL and graphics hardware. Coverage includesA practical introduction to the essentials of realtime 3D graphicsCore OpenGL 4.3 techniques for rendering, transformations, and texturingFoundational math for creating interesting 3D graphics with OpenGLWriting your own shaders, with examples to get you startedCross-platform OpenGL, including essential platform-specific API initialization material for Linux, OS X, and WindowsVertex processing, drawing commands, primitive processing, fragments, and framebuffersUsing compute shaders to harness today's graphics cards for more than graphicsMonitoring and controlling the OpenGL graphics pipelineAdvanced rendering: light simulation, artistic and non-photo-realistic rendering, and deferred shadingModern OpenGL debugging and performance optimization"Bonus material and sample code are available from the companion Web site, "openglsuperbible.com.
Hacking Secret Ciphers with Python
Al Sweigart - 2013
The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative & affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.The full book can be found online here: https://inventwithpython.com/hacking/
Animation in HTML, CSS, and JavaScript
Kirupa Chinnathambi - 2013
Each chapter is filled with cleanly explained concepts, beautifully illustrated diagrams, colorific code snippets, and cringeworthy one-liners guaranteed to make your friend who laughs at everything groan.You will start by learning how to create animations and transitions in CSS. Towards the end, you will learn how to create animations in JavaScript by manipulating DOM elements as well as pushing pixels on the canvas. Along the way, you will see numerous small and large examples explaining how what you are learning applies to what is done in the real world.If you ever get stuck or need a group of friendly people to help you out with your animation-related issues, get free online support, demos, video tutorials, and other good stuff at: http://www.kirupa.com
Apache Camel Developer's Cookbook
Scott Cranton - 2013
It is concise and to the point, and it helps developers get their data flowing between different components without the need to read through page upon page of theory, while also enabling the reader to learn how to create exciting new projects.Camel Enterprise Integration Cookbook is intended for developers who have some familiarity with Apache Camel and who want a quick lookup reference to practical, proven tips on how to perform common tasks. Every recipe also includes a summary and reference pointers for more details that make it easy for you to get a deeper understanding of the Apache Camel capabilities that you will use day to day.
Pro Node.Js for Developers
Colin J. Ihrig - 2013
Respected companies such as Dow Jones and LinkedIn are among the many organizations to have seen Node's potential and adopted it into their businesses.Pro Node.js for Developers provides a comprehensive guide to this exciting new technology. We introduce you to Node - what it is, why it matters and how to set it up - before diving deeply into the key concepts and APIs that underpin its operation.Building upon your existing JavaScript skills you'll be shown how to use Node.js to build both Web- and Network-based applications, to deal with data sources, capture events and deal with child processes to create robust applications that will work well in a wide range of circumstances.Once you've mastered these skills we'll go further, teaching you more advanced software engineering skills that will give your code a professional edge. You'll learn how to create easily reusable modules that will save you time through code reuse, to log and debug your applications quickly and effectively and to write code that will scale easily and reliably as the demand for your application grows.
Death to the Armatures: Constraint-Based Rigging in Blender
Christopher Kuhn - 2013
The book utilizes constraints to achieve realistic motion. Related topics are covered, including Origins, parenting, Empties, Global Space versus Local, etc. Several models are built and rigged in the course of the book, with a single-cylinder gasoline engine as the final project.This is not a "Blender 101" book. It assumes the reader will have a basic knowledge of modeling (though advanced techniques are certainly not required). All models used in this book can be freely downloaded online.
802.11ac: A Survival Guide
Matthew S. Gast - 2013
This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.Author Matthew Gast—an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance—explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started.Understand how the 802.11ac protocol works to improve the speed and capacity of a wireless LANExplore how beamforming increases speed capacity by improving link margin, and lays the foundation for multi-user MIMOLearn how multi-user MIMO increases capacity by enabling an AP to send data to multiple clients simultaneouslyPlan when and how to upgrade your network to 802.11ac by evaluating client devices, applications, and network connections
MCSA Windows Server 2012 Complete Study Guide
William Panek - 2013
This value-priced study guide includes more than 1,000 pages of quality exam-prep content, covering 100 percent of the objective domains of all three exams (as well as the Upgrade exam, 70-417). Also includes more than 500 practice questions. You also have access to three bonus exams, electronic flashcards, and videos showing how to perform the more difficult tasks. Both first-time MCSA candidates and those wishing to upgrade from Server 2008 certification will benefit from this complete test-prep guide.Provides a comprehensive study guide for all three MCSA Windows Server 2012 exams: 70-410, 70-411, and 70-412, as well as the Upgrade exam: 70-417 Covers installing and configuring Windows Server 2012; deploying and configuring DNS service; administering Active Directory; creating and managing Group Policy Objects; and configuring server roles and features, Hyper-V, and core networking services Explains basic networking concepts, DHCP, deploying and maintaining servers, configuring a network policy server infrastructure and high availability in Windows Server 2012, and much more Features real-world scenarios, hands-on exercises, practice exams, electronic flashcards, and over an hour of video demonstrations Covers all exam objectives MCSA Windows Server 2012 Complete Study Guide arms you with all the information you must master to achieve MCSA certification on Windows Server 2012.
Freeswitch 1.2
Anthony Minessale - 2013
This book is full of practical code examples aimed at a beginner to ease his or her learning curve.This book is written for IT professionals and enthusiasts who are interested in quickly getting a powerful telephony system up and running using the free and open source application, FreeSWITCH.Telephony experience will be helpful, but not required.
AOP in .NET: Practical Aspect-Oriented Programming
Matthew Groves - 2013
The book's many examples concentrate on modularizing non-functional requirements that often sprawl throughout object-oriented projects. Even if you've never tried AOP before, you'll appreciate the straightforward introduction using familiar C#-based examples. AOP tools for .NET have now reached the level of practical maturity Java developers have relied on for many years, and you'll explore the leading options, PostSharp, and Castle DynamicProxy.About the TechnologyCore concerns that cut across all parts of your application, such as logging or authorization, are difficult to maintain independently. In aspect-oriented programming (AOP) you isolate these cross-cutting concerns into their own classes, disentangling them from business logic. Mature AOP tools like PostSharp and Castle DynamicProxy now offer .NET developers the level of support Java coders have relied on for years.About this BookAOP in .NET introduces aspect-oriented programming and provides guidance on how to get the most practical benefit from this technique. The book's many examples concentrate on modularizing non-functional requirements that often sprawl throughout object-oriented projects. You'll appreciate its straightforward introduction using familiar C#-based examples.This book requires no prior experience with AOP. Readers should know C# or another OO language.What's InsideClear and simple introduction to AOPMaximum benefit with minimal theoryPostSharp and Castle DynamicProxyPurchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the AuthorMatthew D. Groves is a developer with over ten years of professional experience working with C#, ASP.NET, JavaScript, and PHP.Table of ContentsPART 1 GETTING STARTED WITH AOPIntroducing AOPAcme Car RentalPART 2 THE FUNDAMENTALSOF AOPCall this instead: intercepting methodsBefore and after: boundary aspectsGet this instead: intercepting locationsUnit testing aspectsPART 3 ADVANCED AOP CONCEPTSAOP implementation typesUsing AOP as an architectural toolAspect composition: example and execution
Brain-Computer Interfacing: An Introduction
Rajesh P.N. Rao - 2013
Recent advances in neuroscience and engineering are making this a reality, opening the door to restoring and potentially augmenting human physical and mental capabilities. Medical applications such as cochlear implants for the deaf and deep brain stimulation for Parkinson's disease are becoming increasingly commonplace. Brain- computer interfaces (BCIs) (also known as brain- machine interfaces or BMIs) are now being explored in applications as diverse as security, lie detection, alertness monitoring, telepresence, gaming, education, art, and human augmentation. This introduction to the field is designed as a textbook for upper- level undergraduate and first year graduate courses in neural engineering or brain- computer interfacing for students from a wide range of disciplines. It can also be used for self- study and as a reference by neuroscientists, computer scientists, engineers, and medical practitioners. Key features include: Essential background in neuroscience, brain recording and stimulation technologies, signal processing, and machine learning. Detailed description of the major types of BCIs in animals and humans, including invasive, semi-invasive, noninvasive, stimulating, and bidirectional BCIs In-depth discussion of BCI applications and BCI ethics Questions and exercises in each chapter Supporting Web site with annotated list of book- related links
CTS Certified Technology Specialist Exam Guide
Brad Grimes - 2013
You'll get learning objectives at the beginning of each chapter, best practices, checklists, diagrams, photos, chapter review questions with in-depth explanations, and a full-color insert. Designed to help you prepare for the CTS exam, this authoritative resource also serves as an essential on-the-job reference.Electronic content includes:One all-new CTS practice exam Covers all current CTS exam objectives, including how to:Conduct a site survey Gather customer information Evaluate and recommend changes to a site environment Develop a functional AV scope Design, provide, and sell AV solutions Conduct a vendor selection process Operate AV solutions Conduct maintenance activities Manage AV solutions and operations Project manage AV projects Perform AV finance and job costing activities Troubleshoot and repair AV solutions
Expert Oracle Rac 12c
Riyaj Shamsudeen - 2013
As a seasoned professional, you are probably aware of the importance of understanding the technical details behind the RAC stack. This book provides deep understanding of RAC concepts and implementation details that you can apply toward your day-to-day operational practices. You'll be guided in troubleshooting and avoiding trouble in your installation. Successful RAC operation hinges upon a fast-performing network interconnect, and this book dedicates a chapter solely to that very important and easily overlooked topic. All four authors are experienced RAC engineers with a wealth of hard-won experience encountering and surmounting the challenges of running a RAC environment that delivers on its promise. In Expert Oracle RAC 12c they provide you a framework in which to avoid repeating their hard-won lessons. Their goal is for you to manage your own RAC environment with ease and expertise.Provides a deep conceptual understanding of RAC Provides best practices to implement RAC properly and match application workload Enables readers to troubleshoot RAC with ease
Social Media Scams: Protect Yourself on Facebook, Twitter, eBay & More (Volume 2)
Kathleen McMahon - 2013
Written with the non-technical person in mind, this book will explain how scams work, red flag clues for recognizing a scam before you become a victim, and actual real-world examples on the most popular social media sites in use today.This volume explores more in depth:- a little history on the rise of social media sites- in depth descriptions of social media scams on: * Facebook, YouTube, eBay, Twitter, Craigslist, LinkedIn, and more * Dating websites- understanding security on social media sites, including for childrenHighly readable and accessible, this book will provide the tools you need to detect and protect yourself, and your money, from despicable Internet scammers.Available on Amazon at: http://amzn.to/RZSfZc
Pro ASP.Net Web API Security: Robust Security for ASP.Net MVC Applications
Badrinarayanan Lakshmiraghavan - 2013
Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP With such wide accessibility, securingyour code effectively needs to be a top priority. You will quickly find that the WCF security protocols you?re familiar with from .NET (WS-* and similar)are less suitable than they once were in this new environment; proving themselves cumbersome and limited in terms of the standards they can work with. Fortunately, ASP.NET Web API provides asimple robust security solution of its own that fits neatly within the ASP.NET MVC programming model and secures your code without the need for SOAP meaningthat there is no limit to the range of devices that it can work with ? if it can understand HTTP then it can be secured by Web API. These SOAP-less security techniques are the focus of this book. What you?ll learn Basic and advanced HTTP and security concepts needed to effectively secure ASP.NET Web API applications Knowledge-factor based basic, digest and Windows authenticaton schemes Ownership factors such as pre-shared keys, client X.509 certificates, JWT (both JWS and JWE) and SWT as OAuth 2.0 bearer token, SAML token from AD FS Combinations of the previous two techniques - called two-factor security - to provide further enhanced security. Who this book is forNo prior experience of .NET-security is needed to read this book. All security related concepts will be introduced from first-principles and developed to the point where you can use them confidently in a professional environment. A goodworking knowledge and experience of C# and the .NET framework are the onlypre-requisites to benefit from this book.
Scratch Programming in easy steps: Covers versions 1.4 and 2.0
Sean McManus - 2013
Using Scratch’s highly visual interface, you'll learn how to make games and animations. Along the way, you’ll learn about some important ideas that underpin most programming languages. The book includes examples of games and techniques that readers are invited to customize and build on to make their own programs, and begins with a foreword by Mitchel Resnick, Professor of Learning Research at the MIT Media Lab, which created Scratch.Scratch makes it easy to create your own games, animations, music, art or applications. It's the perfect way to learn programming because it takes away a lot of the complexity. That means you can focus on having great ideas and bringing them to life.This book is an in-depth guide to both the new web-based Scratch 2.0, and Scratch 1.4, as used on the Raspberry Pi. With no prior knowledge needed, this book takes you from scratch to Scratcher!
Concepts, Ontologies, and Knowledge Representation (SpringerBriefs in Computer Science)
Grega Jakus - 2013
This brief examines several ideas about the representation of knowledge addressing this challenge. A widespread general agreement is followed that states uniform knowledge representation should be achievable by using ontologies populated with concepts. A separate chapter is dedicated to each of the three introduced topics, following a uniform outline: definition, organization, and use. This brief is intended for those who want to get to know the field of knowledge representation quickly, or would like to be up to date with current developments in the field. It is also useful for those dealing with implementation as examples of numerous operational systems are also given.
Mastering Windows Server 2012 R2
Mark Minasi - 2013
This book gets you up to speed on all of the new features and functions of Windows Server, and includes real-world scenarios to put them in perspective. If you're a system administrator upgrading to, migrating to, or managing Windows Server 2012 R2, find what you need to do the job in this complete resource.Learn all about:Installing or upgrading to and managing Windows Server 2012 R2 Understanding Microsoft NIC teams 2012 and PowerShell Setting up via GUI or updated Server Core 2012 Migrating, merging, and modifying your Active Directory Managing address spaces with IPAM Understanding new shared storage, storage spaces, and better tools Controlling access to file shares--a new and improved approach Using and administering Remote Desktop, Virtual Desktop, and Hyper-V(R)
Microsoft Visual C# 2013 Step by Step
John Sharp - 2013
If you have previous programming experience but are new to Visual C# 2013, this tutorial delivers the step-by-step guidance and coding exercises you need to master core topics and techniques.Discover how to:Create and debug C# applications in Visual Studio 2013Work with variables, identifiers, statements, operators, and methodsCreate interfaces and define abstract classesWrite robust code that can catch and handle exceptionsDisplay and edit data using data binding with Microsoft ADO.NET Entity FrameworkRespond to user input and touchscreen gesturesHandle events arising from multiple sourcesDevelop your first Windows 8.1 apps
Boost.Asio C++ Network Programming
John Torjo - 2013
Boost.Asio provides an excellent level of abstraction, making sure that with a minimal amount of coding you can create beautiful client/server applications, and have fun in the process!'Boost.Asio C++ Network Programming" shows how to build client/server applications using a library that is part of the popular peer-reviewed Boost C++ Libraries. It analyzes whether you should go synchronous or asynchronous and the role that threading plays, whilst providing examples you can run and extend for yourself.After covering the fundamentals of Boost.Asio you’ll discover how you can build synchronous and asynchronous clients and servers. You will also see how you can have your own asynchronous functions play nice with Boost.Asio. As a bonus, we will introduce co-routines, which make asynchronous programming a piece of cake. Nowadays, network programming is a must, no matter what type of programmer you are. "Boost.Asio C++ Network Programming" shows just how simple networking can be, if you’re using the right tools.
Approach
What you want is an easy level of abstraction, which is just what this book provides in conjunction with Boost.Asio. Switching to Boost.Asio is just a few extra #include directives away, with the help of this practical and engaging guide.
Who this book is for
This book is great for developers that need to do network programming, who don’t want to delve into the complicated issues of a raw networking API. You should be familiar with core Boost concepts, such as smart pointers and shared_from_this, resource classes (noncopyable), functors and boost::bind, boost mutexes, and the boost date/time library. Readers should also be familiar with “blocking” versus “non-blocking” operations.
Sams Teach Yourself Jquery and JavaScript in 24 Hours
Brad Dayley - 2013
Now, in just 24 lessons of one hour or less, you can learn how to leverage jQuery's power in tasks ranging from simple effects to complex forms. Each short, easy lesson builds on all that's come before, teaching jQuery's features and add-ons from the ground up, in the context of delivering real solutions. "Sams Teach Yourself jQuery and JavaScript in 24 Hours" covers all this, and much more:Understanding and accessing the jQuery librariesAdding effects and creating animationsDesigning multimedia slideshows and lightboxesHandling events, interacting with forms, and instrumenting callbacksTaking advantage of jQuery pluginsCreating sortable lists, drag and droppable elements, and resizable imagesWorking iwth data: JSON, XML, queues, and bindingAccessing server-side data via AJAXPositioning page elements and creating interactionsUsing jQueryUI widgets and themesCommunicating with server scriptsDeveloping mobile sites, pages, and contentStep-by-step instructions walk you through common questions, issues, and tasks; Q&As, Quizzes, and Exercises build and test your knowledge; "Did You Know?" tips offer insider advice and shortcuts; and "Watch Out!" alerts help you avoid problems. By the time you're finished, you'll be comfortable going beyond the book to build powerful new jQuery solutions on your own.
Introduction to Computer Networks and Cybersecurity
Chwan-Hwa Wu - 2013
This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
Get the Fundamentals of Internet Architecture and the Protocol Layers
Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks--through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion.
Learn about Malware and Security Systems
Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication.
Understand Cyber Attacks--and What You Can Do to Defend against Them
This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them.Pedagogical FeaturesThe book's modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint(R) animations, are available to instructors with qualifying course adoption.
Dreamweaver Cs6 Mobile and Web Development with Html5, Css3, and Jquery Mobile
David Karlins - 2013
These technologies have radically reconfigured the process of designing web content and function in the widest possible range of browsing environments, ranging from desktops to mobile devices."Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile" is essentially three books in one: an introduction to building websites; Dreamweaver CS6: HTML5, CSS3, Responsive Design; and an in-depth explanation of how to build inviting, accessible mobile sites with Dreamweaver CS6, responsive design, and jQuery Mobile.This book serves both as the essential reference for Dreamweaver CS6, and a valuable addition to even the most extensive set of resources for modern web design, with or without Dreamweaver.The book starts off by teaching you to create sites and pages with Dreamweaver CS6 and how to use HTML5 for page structure. Then we will learn some cutting-edge design and animation with CSS3. The book also shows how to create and enhance mobile sites with jQuery Mobile. You will also learn to customize themes with ThemeRoller."Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile Mobile" covers the entire spectrum of web design with Dreamweaver, with an emphasis on multi-media (full screen and mobile) design and jQuery Mobile.
Approach
This book combines accessible, clear, engaging, and candid reference material, advice, and shortcuts with substantial step-by-step instructions for creating a wide range of HTML5 and CSS3 designs and page content in Dreamweaver.
Who this book is for
This book is geared towards experienced Dreamweaver web designers migrating to HTML5 and jQuery. It also targets web designers new to Dreamweaver who want to jump with two feet into the most current web design tools and features. While focused primarily on Dreamweaver CS5.5, the book includes content of value to readers using older versions of Dreamweaver with directions on installing a version of Adobe’s HTML5 Pack that updates those older packages.
OpenGL ES 2 for Android
Kevin Brothaler - 2013
It's never been a better time to learn how to create your own 3D games and live wallpaper for Android. You'll find out all about shaders and the OpenGL pipeline, and discover the power of OpenGL ES 2.0, which is much more feature-rich than its predecessor. If you can program in Java and you have a creative vision that you'd like to share with the world, then this is the book for you. This book will teach you everything you need to know to create compelling graphics on Android. You'll learn the basics of OpenGL by building a simple game of air hockey, and along the way, you'll see how to initialize OpenGL and program the graphics pipeline using shaders. Each lesson builds upon the one before it, as you add colors, shading, 3D projections, touch interaction, and more. Then, you'll find out how to turn your idea into a live wallpaper that can run on the home screen. You'll learn about more advanced effects involving particles, lighting models, and the depth buffer. You'll understand what to look for when debugging your program, and what to watch out for when deploying to the market. OpenGL can be somewhat of a dark art to the uninitiated. As you read this book, you'll learn each new concept from first principles. You won't just learn about a feature; you'll also understand how it works, and why it works the way it does. Everything you learn is forward-compatible with the just-released OpenGL ES 3, and you can even apply these techniques to other platforms, such as iOS or HTML5 WebGL.Printed in full color.
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Paulo Shakarian - 2013
This new domain of warfare is not only inhabited by governments such as China, Russia, Iran, and the United States, but a variety of other actors including insurgent groups like Hezbollah and Hamas as well as hacking groups such as Anonymous, LulzSec, and others. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare, written by experts on the front lines, explores the cutting edge world of cyber-warfare including the following: Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play.Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah, ) and cyber-attack as a tool against dissidents within a state (Russia, Iran)Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as "Anonymous "and "LulzSec "Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on "Stuxent"
Information Security: The Complete Reference
Mark Rhodes-Ousley - 2013
Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security--from concepts to details--this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.Understand security concepts and building blocksIdentify vulnerabilities and mitigate riskOptimize authentication and authorizationUse IRM and encryption to protect unstructured dataDefend storage devices, databases, and softwareProtect network routers, switches, and firewallsSecure VPN, wireless, VoIP, and PBX infrastructureDesign intrusion detection and prevention systemsDevelop secure Windows, Java, and mobile applicationsPerform incident response and forensic analysis
Java Programming for Android Developers for Dummies
Barry Burd - 2013
This beginner guide gets you up and running with using Java to create Android apps with no prior knowledge or experienced necessary!Shows you the basic Java development concepts and techniques that are necessary to develop Android appsExplores what goes into creating an Android app to give you a better understanding of the various elementsAddresses how to deal with standard programming challenges and debugging"Beginning Android Programming with Java For Dummies" puts you well on your way toward creating Android apps quickly with Java.
The Mature Optimization Handbook
Carlos Bueno - 2013
There are few clear principles, only rules of thumb.Part of the problem is that optimization is hard to do well. It’s frighteningly easy to devolve into superstitious ritual and rationalization. Then again, there can be big payoffs hidden in surprising places. That’s why expert advice about performance tends to have a gnomic, self-contradictory flavor: “If you don’t know what you are doing, don’t do it! You’ll know if you know what you are doing. And remember to design your programs for performance.” The experts are acutely worried about encouraging more folly, yet can’t quite bring themselves to ignore the possible gains.
Engineering Software as a Service: An Agile Approach Using Cloud Computing + $10 AWS Credit
Armando Fox - 2013
This book is neither a step-by-step tutorial nor a reference book. Instead, our goal is to bring a diverse set of software engineering topics together into a single narrative, help readers understand the most important ideas through concrete examples and a learn-by-doing approach, and teach readers enough about each topic to get them started in the field. Courseware for doing the work in the book is available as a virtual machine image that can be downloaded or deployed in the cloud. A free MOOC (massively open online course) at saas-class.org follows the book's content and adds programming assignments and quizzes. See http://saasbook.info for details.
Dreamweaver CC Digital Classroom
Jeremy Osborn - 2013
This book includes 16 self-paced lessons that help you discover essential skills and explore the new features and capabilities of DRER. Each lesson includes step-by-step instructions and lesson files, along with video tutorials that complement the topics covered in each lesson. These accompanying files are provided on the included DVD, developed by the same team of Adobe Certified Instructors and DRER experts who have created many of the official training titles for Adobe Systems. This training package demonstrates how to design, develop, and maintain a fully functioning website. Coverage includes applying style sheets, using dynamic HTML, adding style with images and multimedia, publishing and maintaining a web site, using hyperlinks to navigate throughout a website or link to other sites on the Internet, and using databases to create dynamic websites. Jam-packed with information, this book takes users from the basics through intermediate level topics and helps readers find the information they need in a clear, approachable manner.
Reproducible Research with R and R Studio
Christopher Gandrud - 2013
Suitable for researchers in any quantitative empirical discipline, it presents practical tools for data collection, data analysis, and the presentation of results.With straightforward examples, the book takes you through a reproducible research workflow, showing you how to use:R for dynamic data gathering and automated results presentation knitr for combining statistical analysis and results into one document LaTeX for creating PDF articles and slide shows, and Markdown and HTML for presenting results on the web Cloud storage and versioning services that can store data, code, and presentation files; save previous versions of the files; and make the information widely available Unix-like shell programs for compiling large projects and converting documents from one markup language to another RStudio to tightly integrate reproducible research tools in one placeWhether you're an advanced user or just getting started with tools such as R and LaTeX, this book saves you time searching for information and helps you successfully carry out computational research. It provides a practical reproducible research workflow that you can use to gather and analyze data as well as dynamically present results in print and on the web. Supplementary files used for the examples and a reproducible research project are available on the author's website.
Lambda Calculus with Types
Henk Barendregt - 2013
The lambda calculus forms a prototype universal programming language, which in its untyped version is related to Lisp, and was treated in the first author's classic The Lambda Calculus (1984). The formalism has since been extended with types and used in functional programming (Haskell, Clean) and proof assistants (Coq, Isabelle, HOL), used in designing and verifying IT products and mathematical proofs. In this book, the authors focus on three classes of typing for lambda terms: simple types, recursive types and intersection types. It is in these three formalisms of terms and types that the unexpected mathematical beauty is revealed. The treatment is authoritative and comprehensive, complemented by an exhaustive bibliography, and numerous exercises are provided to deepen the readers' understanding and increase their confidence using types.
C++11 for Programmers
Paul Deitel - 2013
Like all Deitel Developer titles, they teach the best way possible: via hundreds of complete example C++ programs, with thousands of lines of downloadable C++ source code. Unlike other C++11 books, this guide teaches robust, best-practice coding practices that fully support the CERT(R) Coordination Center's authoritative secure coding standards. To help you write programs that are even more secure, the Deitels also introduce C++11's new non-deterministic random-number generation capabilities. Using all these techniques, you can write industrial-strength C+11 code that stands up to attacks from viruses, worms, and other forms of malware. Ideal for anyone who's worked with at least one programming language before, C++11 for Programmers utilizes a proven "early objects" approach, emphasizing program clarity, software reuse, and component-oriented software construction. In addition to the core language, it will help you take advantage of the newest standard libraries and the newest language extensions. Coverage includes many new C++11 features, including smart pointers, regular expressions, shared_ptr and weak_ptr, and more. This book contains 240 complete C++11 programs (more than 15,000 lines of downloadable code). All code has been thoroughly tested on three popular industrial-strength C++11 compilers: GNU C++ 4.7, Microsoft(R) Visual C++(R) 2012, and Apple(R) LLVM in Xcode(R) 4.5.
Visual Alchemy: The Fine Art of Digital Montage
Catherine McIntyre - 2013
Free of her Rotring pens and scalpel, she now uses Photoshop to create her montages. Visual Alchemy explores McIntyre's sources of inspiration as well as her methods, offering an aesthetic guide to composition, color, texture and all of the other means of communication that artists have at their disposal. While these concepts and techniques make use of Photoshop, they will apply to any digital imaging program and indeed to any medium, whether traditional or digital. Featuring McIntyre's own art as well as that of artists around the globe, Visual Alchemy is an invitation to discover the artistic possibilities of picture making through digital montage.
Oracle Database 12c New Features
Robert Freeman - 2013
Freeman, this Oracle Press guide describes the myriad new and enhanced capabilities available in the latest Oracle Database release. Inside, you'll find everything you need to know to get up and running quickly on Oracle Database 12c. Supported by running commentary from world-renowned Oracle expert Tom Kyte, and with additional contributions by Oracle experts Eric Yen and Scott Black, Oracle Database 12c New Features offers detailed coverage of:Installing Oracle Database 12cArchitectural changes, such as Oracle Multitenant The most current information on upgrading and migrating to Oracle Database 12cThe pre-upgrade information tool and parallel processing for database upgrades Oracle Real Application Clusters new features, such as Oracle Flex Cluster, Oracle Flex Automatic Storage Management, and Oracle Automatic Storage Management Cluster File System Oracle RMAN enhancements, including cross-platform backup and recovery Oracle Data Guard improvements, such as Fast Sync, and Oracle Active Data Guard new features, such as Far Sync SQL, PL/SQL, DML, and DDL new features Improvements to partitioning manageability, performance, and availability Advanced business intelligence and data warehousing capabilities Security enhancements, including privileges analysis, data redaction, and new administrative-level privileges Manageability, performance, and optimization improvements
Deep Web for Journalists - Comms, Counter-Surveillance, Search
Alan Pearce - 2013
All journalists should be aware of the dangers they face in the digital world – the emerging battleground. Being a journalist in 2014 is more dangerous than it ever was. In addition to the usual threats, beatings, murders and war casualties, we are now being actively targeted online by intelligence agencies, law enforcement and others. These days it is not just journalists working in repressive regimes that need worry. We now know that the US and its cyber-allies – Britain, Canada, Australia and New Zealand – actively monitor domestic journalists in their mass surveillance of the Internet. Edward Snowden has warned journalists that they are special targets and he has expressed surprise that news organizations rarely have any counter-measures in place. They harvest our contacts and monitor our telephone logs. They read our emails and texts. They follow our every move online and they keep tabs on every line we write. But it is not just intelligence agencies and law enforcement that we should worry about. All kinds of people have a vested interest in knowing about your next story – individual criminals and criminal organizations, political parties and extremist groups, law firms and the corporate giants. Large business interests have their own intelligence units. They know what is being said about them and by whom. They keep track of their competitors and they know when somebody starts asking awkward questions about them. If big business or anyone wanted to destroy a journalist’s reputation this is simplicity itself. The key is not to attract attention in the first place, and to learn to operate beneath the radar. But how can journalists safeguard their sources and communicate without being overheard? How can they conduct sensitive research without having to watch their backs? This book will show how to block intruders, set up secure communications, mask your identity online and browse and download anonymously, and store any amount of data without leaving a trace. If that wasn't enough, the Deep Web is also a largely-unknown research and information resource. If you know the right entry points, you can mine a rich seam of multimedia files, images, software and documents that you cannot find on the Surface Web. Deep Web for Journalists “offers an uncompromising diagnosis of the perils of online communications and should shatter the confidence many of us place in the unguarded ways of working online,” says Jim Boumelha, President of International Federation of Journalists in his Foreword to the book. Journalist, broadcaster and author Alan Pearce has covered conflicts from the Khmer Rouge to the Taliban for the BBC and Time Magazine, among others. He now teaches cyber-security skills and counter-surveillance to journalists.
Sensible Software 1986-1999
Gary Penn - 2013
The narrative – guided by games industry luminary Gary Penn – tells the Sensible story through interviews and anecdotes from the team, legendary developers, industry bods and our pick of the games journalists who saw Sensible rise to world stardom, first hand.This is paired with an exhaustive visual tour celebrating the company's idiosyncratic style: sprites, game maps, typefaces and box art, all beautifully reproduced. We also dig around in the Sensible vaults to uncover a bounty of never-before-seen archival material including design documents and hand-drawn plans that show the first inklings of Sensible’s most famous games. ‘Praise the heavens; Sensible Software 1986—1999 is a ruddy triumph.’—It’s Nice That‘A brilliant read from start to finish ... It’s not just a videogame history lesson, it’s a glimpse into the lives of the people behind the games that so many of us have grown up with.’—The Average Gamer
Windows Server 2012 Inside Out
William R. Stanek - 2013
Learn how the experts tackle Windows Server 2012—and challenge yourself to new levels of mastery. Topics include:Managing Windows Server 2012 systems Storage and file systems TCP/IP networking DHCP and DNS Active Directory Group Policy Security and access Troubleshooting hardware Performance monitoring and tuning Backup and recovery
Excel 2013: The Missing Manual
Matthew MacDonald - 2013
That’s where this Missing Manual comes in. With crystal-clear explanations and hands-on examples, Excel 2013: The Missing Manual shows you how to master Excel so you can easily track, analyze, and chart your data. You’ll be using new features like PowerPivot and Flash Fill in no time.The important stuff you need to know:Go from novice to ace. Learn how to analyze your data, from writing your first formula to charting your results.Illustrate trends. Discover the clearest way to present your data using Excel’s new Quick Analysis feature.Broaden your analysis. Use pivot tables, slicers, and timelines to examine your data from different perspectives.Import data. Pull data from a variety of sources, including website data feeds and corporate databases.Work from the Web. Launch and manage your workbooks on the road, using the new Excel Web App.Share your worksheets. Store Excel files on SkyDrive and collaborate with colleagues on Facebook, Twitter, and LinkedIn.Master the new data model. Use PowerPivot to work with millions of rows of data.Make calculations. Review financial data, use math and scientific formulas, and perform statistical analyses.
Powershell 3.0 Advanced Administration Handbook
Sherif Talaat - 2013
Expert Oracle Application Express Security
Scott Spendolini - 2013
From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX applictions and defend them from intrusion.Security is a process, not an event. Expert Oracle Application Express Security is written with that theme in mind. Scott Spendolini, one of the original creators of the product, offers not only examples of security best practices, but also provides step-by-step instructions on how to implement the recommendations presented. A must-read for even the most experienced APEX developer, Expert Oracle Application Express Security can help your organization ensure their APEX applications are as secure as they can be.
Beginning Html5 and Css3 for Dummies
Ed Tittel - 2013
What the book covers: getting to know HTML5 and CSS3, creating and viewing a web page, HTML5 element syntax and structure, understanding CSS3 and what it's good for, CSS3 rules and style sheets, HTML5 tables and forms, deprecated HTML and elements to avoid, CSS3 styles and attributes, making CSS3 work, common mistakes and fixes, cool HTML5 tools, understanding responsive web design, and more.Series features: Information presented in the straightforward but fun language that has defined the "Dummies" series for more than twenty years.
Windows Runtime via C#
Jeffrey Richter - 2013
Guided by Jeffrey Richter, a recognized expert in Windows and .NET programming, along with principal Windows consultant Maarten van de Bospoort, you'll master essential concepts. And you'll gain practical insights and tips for how to architect, design, optimize, and debug your apps.With this book, you will:Learn how to consume Windows Runtime APIs from C# Understand the principles of architecting Windows Store apps See how to build, deploy, and secure app packages Understand how apps are activated and the process model controlling their execution Study the rich features available when working with files and folders Explore how to transfer, compress, and encrypt data via streams Design apps that give the illusion of running using live tiles, background transfers, and background tasks Share data between apps using the clipboard and the Share charm Get advice for monetizing your apps through the Windows StoreAbout This BookRequires working knowledge of Microsoft .NET Framework, C#, and the Visual Studio IDE Targeted to programmers building Windows Store apps Some chapters also useful to those building desktop appsTechnologies CoveredWindows 8.1 Microsoft Visual Studio 2013
CMIS and Apache Chemistry in Action
Florian Muller - 2013
In it, you'll tackle hands-on examples for building applications on CMIS repositories from both the client and the server sides. You'll learn how to create new content-centric applications that install and run in any CMIS-compliant repository.About The TechnologyContent Management Interoperability Services (CMIS) is an OASIS standard for accessing content management systems. It specifies a vendor-and language-neutral way to interact with any compliant content repository. Apache Chemistry provides complete reference implementations of the CMIS standard with robust APIs for developers writing tools, applications, and servers.About This BookCMIS and Apache Chemistry in Action is a comprehensive guide to the CMIS standard and related ECM concepts. In it, you'll find clear teaching and instantly useful examples for building content-centric client and server-side applications that run against any CMIS-compliant repository. In fact, using the CMIS Workbench and the InMemory Repository from Apache Chemistry, you'll have running code talking to a real CMIS server by the end of chapter 1.This book requires some familiarity with content management systems and a standard programming language like Java or C#. No exposure to CMIS or Apache Chemistry is assumed.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideThe only CMIS book endorsed by OASISComplete coverage of the CMIS 1.0 and 1.1 specificationsCookbook-style tutorials and real-world examplesAbout the AuthorsFlorian Müller, Jay Brown, and Jeff Potts are among the original authors, contributors, and leaders of Apache Chemistry and the OASIS CMIS specification. They continue to shape CMIS implementations at Alfresco, IBM, and SAP.Table of ContentsPART 1 UNDERSTANDING CMISIntroducing CMISExploring the CMIS domain modelCreating, updating, and deleting objects with CMISCMIS metadata: types and propertiesQueryPART 2 HANDS-ON CMIS CLIENT DEVELOPMENTMeet your new project: The BlendThe Blend: read and query functionalityThe Blend: create, update, and delete functionalityUsing other client librariesBuilding mobile apps with CMISPART 3 ADVANCED TOPICSCMIS bindingsSecurity and controlPerformanceBuilding a CMIS server
How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
Vinay Trivedi - 2013
Now it's time to find out how these things work. Vinay Trivedi peels back the mystery of the Internet, explains it all in the simplest terms, and gives you the knowledge you need to speak confidently when the subject turns to technology.This revised second edition of
How to Speak Tech
consists of two parts: the first spells out the essential terms and technologies of Internet startups to get you up to speed on the jargon you need to know; the second is a primer on the latest tech trends, including the blockchain, augmented and virtual reality, Internet of Things, and artificial intelligence.Neither the Internet nor the top tech trends are beyond anyone, given the right teaching. This book breaks down the major concepts and technologies of a modern app into bite-sized chapters, helping you understand topics that usually are not explained clearly and showing you that it's not rocket science.So go ahead, grab this book and start to speak tech.What You'll LearnUnderstand the basics of new and established technologies such as blockchain, artificial intelligence (AI), augmented and virtual reality (AR and VR), Internet of Things (IoT), software development, programming languages, databases, and moreListen intelligently and speak confidently when technologies are brought up in your businessBe confident in your grasp of terms and technologies when setting up your own organization's application
Who This Book Is ForStudents who want to understand different technologies relevant to their future careers at startups and established organizations, as well as business and other non-technical professionals who encounter and require an understanding of key technical terms and trends to succeed in their rolesReviews
"Finally, a book non-techies can use to understand the web technologies that are changing our lives."
Paul Bottino, Executive Director, Technology and Entrepreneurship Center, Harvard University
"A great book everyone can use to understand how tech startups work."
Rene Reinsberg, Founder, Celo; Former VP of Emerging Products, GoDaddy
"Through the simplicity of his presentation, Vinay shows that the basics of technology can be straightforwardly understood by anyone who puts in the time and effort to learn."
Joseph Lassiter, Professor of Management Science, Harvard Business School and Harvard Innovation Lab
Packet Guide to Voice Over IP
Bruce Hartpence - 2013
With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and subsequent connection teardown.With packet captures available on the companion website, this book is ideal whether you’re an instructor, student, or professional looking to boost your skill set. Each chapter includes a set of review questions, as well as practical, hands-on lab exercises.Learn the requirements for deploying packetized voice and videoUnderstand traditional telephony concepts, including local loop, tip and ring, and T carriersExplore the Session Initiation Protocol (SIP), VoIP’s primary signaling protocolLearn the operations and fields for VoIP’s standardized RTP and RTCP transport protocolsDelve into voice and video codecs for converting analog data to digital format for transmissionGet familiar with Communications Systems H.323, SIP’s widely used predecessorExamine the Skinny Client Control Protocol used in Cisco VoIP phones in networks around the world
Pro Oracle Database 12c Administration
Darl Kuhn - 2013
Author Darl Kuhn draws from a well of experience over a decade deep to lay out real-world techniques that lead to success as an Oracle Database administrator. He gives clear explanations on how to perform critical tasks. He weaves in theory where necessary without bogging you down in unneeded detail. He is not afraid to take a stand on how things should be done. He won't leave you adrift in a sea of choices, showing you three ways to do something and then walking away.Database administration isn't about passing a certified exam, or about pointing-and-clicking your way through a crisis. Database administration is about applying the right solution at the right time, about avoiding risk, about making robust choices that get you home each night in time for dinner with your family. If you have "buck stops here" responsibility for an Oracle database, then Pro Oracle Database 12c Administration is the book you need to help elevate yourself to the level of Professional Oracle Database Administrator.Covers multi-tenant container and pluggable database implementation and management Condenses and organizes the core job of a database administrator into one volume. Takes a results-oriented approach to getting things done. Lays a foundation upon which to build a senior level of expertise
Android Security Cookbook
Keith Makan - 2013
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book.
Java Ee 7 Recipes: A Problem-Solution Approach
Josh Juneau - 2013
Be it a small-business web application, or an enterprise database application, Java EE 7 Recipes provides effective and proven solutions to accomplish just about any task that you may encounter. You can feel confident using the reliable solutions that are demonstrated in this book in your personal or corporate environment.The solutions in Java EE 7 Recipes are built using the most current Java Enterprise specifications, including EJB 3.2, JSF 2.2, Expression Language 3.0, Servlet 3.1, and JMS 2.0. While older technologies and frameworks exist, it is important to be forward-looking and take advantage of all that the latest technologies offer. Rejuvenate your Java expertise to use the freshest capabilities, or perhaps learn Java Enterprise development for the first time and discover one of the most widely used and most powerful platforms available for application development today. Let Java EE 7 Recipes show you the way by showing how to build streamlined and reliable applications much faster and easier than ever before by making effective use of the latest frameworks and features on offer in the Java EE 7 release.Shows off the most current Java Enterprise Edition technologies.Provides solutions to creating sophisticated user interfaces.Demonstrates proven solutions for effective database access.