Best of
Technical

2008

Cracking the Coding Interview: 150 Programming Questions and Solutions


Gayle Laakmann McDowell - 2008
    This is a deeply technical book and focuses on the software engineering skills to ace your interview. The book is over 500 pages and includes 150 programming interview questions and answers, as well as other advice.The full list of topics are as follows:The Interview ProcessThis section offers an overview on questions are selected and how you will be evaluated. What happens when you get a question wrong? When should you start preparing, and how? What language should you use? All these questions and more are answered.Behind the ScenesLearn what happens behind the scenes during your interview, how decisions really get made, who you interview with, and what they ask you. Companies covered include Google, Amazon, Yahoo, Microsoft, Apple and Facebook.Special SituationsThis section explains the process for experience candidates, Program Managers, Dev Managers, Testers / SDETs, and more. Learn what your interviewers are looking for and how much code you need to know.Before the InterviewIn order to ace the interview, you first need to get an interview. This section describes what a software engineer's resume should look like and what you should be doing well before your interview.Behavioral PreparationAlthough most of a software engineering interview will be technical, behavioral questions matter too. This section covers how to prepare for behavioral questions and how to give strong, structured responses.Technical Questions (+ 5 Algorithm Approaches)This section covers how to prepare for technical questions (without wasting your time) and teaches actionable ways to solve the trickiest algorithm problems. It also teaches you what exactly "good coding" is when it comes to an interview.150 Programming Questions and AnswersThis section forms the bulk of the book. Each section opens with a discussion of the core knowledge and strategies to tackle this type of question, diving into exactly how you break down and solve it. Topics covered include• Arrays and Strings• Linked Lists• Stacks and Queues• Trees and Graphs• Bit Manipulation• Brain Teasers• Mathematics and Probability• Object-Oriented Design• Recursion and Dynamic Programming• Sorting and Searching• Scalability and Memory Limits• Testing• C and C++• Java• Databases• Threads and LocksFor the widest degree of readability, the solutions are almost entirely written with Java (with the exception of C / C++ questions). A link is provided with the book so that you can download, compile, and play with the solutions yourself.Changes from the Fourth Edition: The fifth edition includes over 200 pages of new content, bringing the book from 300 pages to over 500 pages. Major revisions were done to almost every solution, including a number of alternate solutions added. The introductory chapters were massively expanded, as were the opening of each of the chapters under Technical Questions. In addition, 24 new questions were added.Cracking the Coding Interview, Fifth Edition is the most expansive, detailed guide on how to ace your software development / programming interviews.

C# in Depth


Jon Skeet - 2008
    With the many upgraded features, C# is more expressive than ever. However, an in depth understanding is required to get the most out of the language.C# in Depth, Second Edition is a thoroughly revised, up-to-date book that covers the new features of C# 4 as well as Code Contracts. In it, you'll see the subtleties of C# programming in action, learning how to work with high-value features that you'll be glad to have in your toolkit. The book helps readers avoid hidden pitfalls of C# programming by understanding "behind the scenes" issues.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

JavaScript: The Good Parts


Douglas Crockford - 2008
    This authoritative book scrapes away these bad features to reveal a subset of JavaScript that's more reliable, readable, and maintainable than the language as a whole--a subset you can use to create truly extensible and efficient code.Considered the JavaScript expert by many people in the development community, author Douglas Crockford identifies the abundance of good ideas that make JavaScript an outstanding object-oriented programming language-ideas such as functions, loose typing, dynamic objects, and an expressive object literal notation. Unfortunately, these good ideas are mixed in with bad and downright awful ideas, like a programming model based on global variables.When Java applets failed, JavaScript became the language of the Web by default, making its popularity almost completely independent of its qualities as a programming language. In JavaScript: The Good Parts, Crockford finally digs through the steaming pile of good intentions and blunders to give you a detailed look at all the genuinely elegant parts of JavaScript, including:SyntaxObjectsFunctionsInheritanceArraysRegular expressionsMethodsStyleBeautiful featuresThe real beauty? As you move ahead with the subset of JavaScript that this book presents, you'll also sidestep the need to unlearn all the bad parts. Of course, if you want to find out more about the bad parts and how to use them badly, simply consult any other JavaScript book.With JavaScript: The Good Parts, you'll discover a beautiful, elegant, lightweight and highly expressive language that lets you create effective code, whether you're managing object libraries or just trying to get Ajax to run fast. If you develop sites or applications for the Web, this book is an absolute must.

The Well-Grounded Rubyist


David A. Black - 2008
    It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the book's easy-to-follow examples and explanations will give you immediate confidence as you build your Ruby programming skills.The Well-Grounded Rubyist is a thoroughly revised and updated edition of the best-selling Ruby for Rails. In this new book, expert author David A. Black moves beyond Rails and presents a broader view of Ruby. It covers Ruby 1.9, and keeps the same sharp focus and clear writing that made Ruby for Rails stand out.Starting with the basics, The Well-Grounded Rubyist explains Ruby objects and their interactions from the ground up. In the middle chapters, the book turns to an examination of Ruby's built-in, core classes, showing the reader how to manipulate strings, numbers, arrays, ranges, hashes, sets, and more. Regular expressions get attention, as do file and other I/O operations.Along the way, the reader is introduced to numerous tools included in the standard Ruby distribution--tools like the task manager Rake and the interactive Ruby console-based interpreter Irb--that facilitate Ruby development and make it an integrated and pleasant experience.The book encompasses advanced topics, like the design of Ruby's class and module system, and the use of Ruby threads, taking even the new Rubyist deep into the language and giving every reader the foundations necessary to use, explore, and enjoy this unusually popular and versatile language.It's no wonder one reader commented: "The technical depth is just right to not distract beginners, yet detailed enough for more advanced readers."Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

MAKE: Electronics: Learning Through Discovery


Charles Platt - 2008
    I also love the sense of humor. It's very good at disarming the fear. And it's gorgeous. I'll be recommending this book highly." --Tom Igoe, author of Physical Computing and Making Things TalkWant to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the theory behind them!Build working devices, from simple to complex You'll start with the basics and then move on to more complicated projects. Go from switching circuits to integrated circuits, and from simple alarms to programmable microcontrollers. Step-by-step instructions and more than 500 full-color photographs and illustrations will help you use -- and understand -- electronics concepts and techniques.Discover by breaking things: experiment with components and learn from failureSet up a tricked-out project space: make a work area at home, equipped with the tools and parts you'll needLearn about key electronic components and their functions within a circuitCreate an intrusion alarm, holiday lights, wearable electronic jewelry, audio processors, a reflex tester, and a combination lockBuild an autonomous robot cart that can sense its environment and avoid obstaclesGet clear, easy-to-understand explanations of what you're doing and why

SCJP Sun Certified Programmer for Java 6 Study Guide


Kathy Sierra - 2008
    100% complete coverage of all official objectives for exam 310-065Exam Objective Highlights in every chapter point out certification objectives to ensure you're focused on passing the exam Exam Watch sections in every chapter highlight key exam topics coveredSimulated exam questions match the format, tone, topics, and difficulty of the real examCovers all SCJP exam topics, including:Declarations and Access Control - Object Orientation - Assignments - Operators - Flow Control, Exceptions, and Assertions - Strings, I/O, Formatting, and Parsing - Generics and Collections - Inner Classes - Threads - DevelopmentCD-ROM includes: Complete MasterExam practice testing engine, featuring: Two full practice exams; Detailed answers with explanations; Score Report performance assessment toolElectronic book for studying on the goBonus coverage of the SCJD exam includedBonus downloadable MasterExam practice test with free online registration.

Programming in Scala


Martin Odersky - 2008
     Coauthored by the designer of the Scala language, this authoritative book will teach you, one step at a time, the Scala language and the ideas behind it. The book is carefully crafted to help you learn. The first few chapters will give you enough of the basics that you can already start using Scala for simple tasks. The entire book is organized so that each new concept builds on concepts that came before - a series of steps that promises to help you master the Scala language and the important ideas about programming that Scala embodies. A comprehensive tutorial and reference for Scala, this book covers the entire language and important libraries.

Secrets of the JavaScript Ninja


John Resig - 2008
    This completely revised edition shows you how to master key JavaScript concepts such as functions, closures, objects, prototypes, and promises. It covers APIs such as the DOM, events, and timers. You’ll discover best practice techniques such as testing, and cross-browser development, all taught from the perspective of skilled JavaScript practitioners.

High Performance MySQL: Optimization, Backups, and Replication


Baron Schwartz - 2008
    This guide also teaches you safe and practical ways to scale applications through replication, load balancing, high availability, and failover. Updated to reflect recent advances in MySQL and InnoDB performance, features, and tools, this third edition not only offers specific examples of how MySQL works, it also teaches you why this system works as it does, with illustrative stories and case studies that demonstrate MySQL’s principles in action. With this book, you’ll learn how to think in MySQL. Learn the effects of new features in MySQL 5.5, including stored procedures, partitioned databases, triggers, and views Implement improvements in replication, high availability, and clustering Achieve high performance when running MySQL in the cloud Optimize advanced querying features, such as full-text searches Take advantage of modern multi-core CPUs and solid-state disks Explore backup and recovery strategies—including new tools for hot online backups

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Introduction to Information Retrieval


Christopher D. Manning - 2008
    Written from a computer science perspective by three leading experts in the field, it gives an up-to-date treatment of all aspects of the design and implementation of systems for gathering, indexing, and searching documents; methods for evaluating systems; and an introduction to the use of machine learning methods on text collections. All the important ideas are explained using examples and figures, making it perfect for introductory courses in information retrieval for advanced undergraduates and graduate students in computer science. Based on feedback from extensive classroom experience, the book has been carefully structured in order to make teaching more natural and effective. Although originally designed as the primary text for a graduate or advanced undergraduate course in information retrieval, the book will also create a buzz for researchers and professionals alike.

Programming: Principles and Practice Using C++


Bjarne Stroustrup - 2008
    Available here:blubbu.com/download?i=0321992784Programming: Principles and Practice Using C++ (2nd Edition) PDF by Bjarne Stroustrup

Juvenile Osteology: A Laboratory and Field Manual (Laboratory & Field Manual) (Laboratory & Field Manual)


Louise Scheuer - 2008
    This resource is essential for the practising osteoarchaeologist and forensic anthropologist who requires a quick, reliable and easy-to-use reference to aid in the identification, siding and aging of juvenile osseous material. While excellent reference books on juvenile osteology are currently available, no pre-existing source adequately fills this particular niche in the market. This field manual is designed with practicality as its primary directive. Descriptions of each bone contain 1) morphological characteristics useful for identification, 2) other elements with which the bone may be confused, 2) tips for siding, 3) illustrations of varying developmental phases, 4) data useful for ageing, and 5) a summary of developmental timings. Concise, bullet-style descriptions assist with quick retrieval of information. Unique to this manual is the presentation of data collected from a variety of populations, utilizing a range of observational methods, as an alternative to providing one overall aging summary that is derived from a compilation of many individual sources. This manual provides a host of data on a variety of populations to enable the user to select the reference most applicable to their needs. The final chapter combines information from each bone to provide a summary of developmental changes occurring at different life stages to act as an immediate 'ready reckoner' for the knowledgeable practitioner. It also provides forms useful for documenting juvenile material and diagrams to help with the recognition of commingled juvenile remains. The manual is a must for anyone responsible for the evaluation of juvenile osseous material through dry bone assessment, radiographs, sonograms, and or CT scans. *Identifies every component of the developing skeleton *Provides detailed analysis of juvenile skeletal remains and the development of bone as a tissue *Summarizes key morphological stages in the development of every bone*Provides data on a variety of populations to enable the user to select the reference most applicable to their needs*Focuses on practicality, with direct, bullet style descriptions*Provides forms for documenting juvenile material*Provides diagrams to help with the recognition of commingled juvenile remains*Final chapter provides summary of developmental changes occurring at different life stages to act as an immediate 'ready reckoner' for the practitioner

The Art of Computer Programming, Volume 4, Fascicle 0: Introduction to Combinatorial Algorithms and Boolean Functions


Donald Ervin Knuth - 2008
    Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 Art of Computer Programming, Volume 4, Fascicle 0, The: Introduction to Combinatorial Algorithms and Boolean Functions: Introduction to Combinatorial Algorithms and Boolean Functions This multivolume work on the analysis of algorithms has long been recognized as the definitive description of classical computer science. The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth s writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his cookbook solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books. To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called "fascicles," which will be published at regular intervals. Each fascicle will encompass a section or more of wholly new or revised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete. Volume 4, Fascicle 0 This fascicle introduces what will become by far the longest chapter in "The Art of Computer Programming," a chapter on combinatorial algorithms that will itself fill three full-sized volumes. Combinatorial algorithms, informally, are techniques for the high-speed manipulation of extremely large quantities of objects, such as permutations or the elements of graphs. Combinatorial patterns or arrangements solve vast numbers of practical problems, and modern approaches to dealing with them often lead to methods that are more than a thousand times faster than the straightforward procedures of yesteryear. This fascicle primes the pump for everything that follows in the chapter, discussing first the essential ideas of combinatorics and then introducing fundamental ideas for dealing efficiently with 0s and 1s inside a machine, including Boolean basics and Boolean function evaluation. As always, the author s exposition is enhanced by hundreds of new exercises, arranged carefully for self-instruction, together with detailed answers. "

Pragmatic Thinking and Learning: Refactor Your Wetware


Andy Hunt - 2008
    Not in an editor, IDE, or design tool. You're well educated on how to work with software and hardware, but what about wetware--our own brains? Learning new skills and new technology is critical to your career, and it's all in your head. In this book by Andy Hunt, you'll learn how our brains are wired, and how to take advantage of your brain's architecture. You'll learn new tricks and tips to learn more, faster, and retain more of what you learn. You need a pragmatic approach to thinking and learning. You need to Refactor Your Wetware. Programmers have to learn constantly; not just the stereotypical new technologies, but also the problem domain of the application, the whims of the user community, the quirks of your teammates, the shifting sands of the industry, and the evolving characteristics of the project itself as it is built. We'll journey together through bits of cognitive and neuroscience, learning and behavioral theory. You'll see some surprising aspects of how our brains work, and how you can take advantage of the system to improve your own learning and thinking skills.In this book you'll learn how to:Use the Dreyfus Model of Skill Acquisition to become more expertLeverage the architecture of the brain to strengthen different thinking modesAvoid common "known bugs" in your mindLearn more deliberately and more effectivelyManage knowledge more efficientlyPrinted in full color.

Object-Oriented JavaScript


Stoyan Stefanov - 2008
    This book is for the beginning to intermediate web developer who wants to solve web development problems with smart JavaScript. It does not assume any prior knowledge of JavaScript programming; however even if you already know some JavaScript, there will be plenty for you to learn here.

Microsoft SQL Server 2008: T-SQL Fundamentals


Itzik Ben-Gan - 2008
    Get hands-on guidance—including exercises and code samples—that show you how to develop code to query and modify data. You’ll gain a solid understanding of the T-SQL language and good programming practices, and learn to write more efficient and powerful queries. Discover how to: Apply T-SQL fundamentals, create tables, and define data integrity Understand logical query processing Query multiple tables using joins and subqueries Simplify code and improve maintainability with table expressions Explore pivoting techniques and how to handle grouping sets Write code that modifies data Isolate inconsistent data and address deadlock and blocking scenarios

Springer Handbook of Robotics


Bruno Siciliano - 2008
    Having broken free from its origins in industry, robotics has been rapidly expanding into the challenging terrain of unstructured environments. Unlike other handbooks that focus on industrial applications, the Springer Handbook of Robotics incorporates these new developments. Just like all Springer Handbooks, it is utterly comprehensive, edited by internationally renowned experts, and replete with contributions from leading researchers from around the world. The handbook is an ideal resource for robotics experts but also for people new to this expanding field.

Digital Clay: Character Creation with ZBrush +DVD


Scott Spencer - 2008
    "ZBrush Character Creation: Advanced Digital Sculpting" is the must-have guide to creating highly detailed, lush, organic models using the revolutionary ZBrush software. Digital sculptor Scott Spencer guides you through the full array of ZBrush tools, including brushes, textures and detailing. With a focus on both the artistry and the technical know-how, you'll learn how to apply traditional sculpting and painting techniques to 3D art while uncovering the "why" behind the "how" for each step. You'll gain inspiration and insight from the beautiful full-color illustrations and professional tips from experienced ZBrush artists included in the book. And, above all, you'll have a solid understanding of how applying time-honored artistic methods to your workflow can turn ordinary digital art into breathtaking digital masterpieces.

Aircraft Propulsion


Saeed Farokhi - 2008
    The book covers aircraft gas turbine engine and rocket propulsion from its basic principles to more advanced treatments in engine components. Propulsion system integration with aircraft plays an important role in understanding propulsion and is thus addressed in the book. Extensive review material and derivations are intended to help students navigate through the subject with more ease. Over 100 examples and 300 problems are designed to practice the principles learned in jet propulsion and compliment learning through applications. In every engine component, issues related to manufacturing, material properties, temperature limitations and cooling are included to give students an appreciation for the broader scope of propulsion engineering than just aero-thermodynamics. Component matching and off-design analysis is detailed in a separate chapter to provide the physical and performance linkage between the components and their impact on aircraft engines. Principles of chemical rocket propulsion are presented in the context of single-stage to orbit propulsion needs of a rocket-based combined cycle vehicle. The broad treatment of the gas turbine engine cycles and components makes the book suitable as a reference for propulsion and turbomachinery engineers, gas turbine industry and professional development courses.

Special Operations Forces Medical Handbook


Warner D. Farr - 2008
    Nearly 140 comprehensive illustrations show the proper techniques for medical care, from basic first-aid and orthopedics to instructions for emergency war surgery and even veterinary medicine. Questions are listed so that the medic can obtain an accurate patient history and perform a complete physical examination. Diagnoses are made easier with information on the distinctive features of each illness. This straightforward manual is sure to assist any reader faced with a medical issue or emergency.

Quantum Computing for Computer Scientists


Noson S. Yanofsky - 2008
    Quantum Computing for Computer Scientists takes readers on a tour of this fascinating area of cutting-edge research. Written in an accessible yet rigorous fashion, this book employs ideas and techniques familiar to every student of computer science. The reader is not expected to have any advanced mathematics or physics background. After presenting the necessary prerequisites, the material is organized to look at different aspects of quantum computing from the specific standpoint of computer science. There are chapters on computer architecture, algorithms, programming languages, theoretical computer science, cryptography, information theory, and hardware. The text has step-by-step examples, more than two hundred exercises with solutions, and programming drills that bring the ideas of quantum computing alive for today's computer science students and researchers.

Titanic: The Ship Magnificent, Volume Two: Interior Design & Fitting Out


Art Braunschweiger - 2008
    Even in Third Class, the accommodation was better than on First Class on many older ships. In the second volume of Titanic: The Ship Magnificent, for the first time, Bruce Beveridge, Steve Hall, Scott Andrews, Daniel Klistorner and Art Braunschweiger look at the ship itself, and at her interior design and fittings. From cobalt blue Spode china and Elkington plate silverware in the a la carte restaurant to the design of the boilers and fixtures and fittings onboard the world's most luxurious vessel, they tell the story of a liner built at the peak of the race between the British, French and Germans to build bigger and better ships.

Scott Kelby's Digital Photography Set: The Digital Photography Book, Volumes 1 and 2


Scott Kelby - 2008
    Scott Kelby, the man who changed the "digital darkroom" forever with his ground-breaking, bestselling The Photoshop Book for Digital Photographers, now tackles the most important side of digital photography--how to take professional-quality shots using the same tricks today's top digital pros use (and it's easier than you think). These aren't books of theory, full of confusing jargon and detailed concepts. These are books on which button to push, which setting to use, and when to use it. Each page covers a single concept on how to make your photography better. Every time you turn the page, you'll learn another pro setting, tool, or trick to transform your work from snapshots into gallery prints. If you're tired of shots that look "okay," and if you're tired of looking in photography magazines and thinking, "Why don't my shots look like that?" then these are the books for you.

SQL Server Execution Plans


Grant Fritchey - 2008
    They can provide you with a wealth of information on how your queries are being executed by SQL Server, including: Which indexes are being used, and where no indexes are being used at all. How the data is being retrieved, and joined, from the tables defi ned in your query. How aggregations in GROUP BY queries are put together. The anticipated load and the estimated cost that all these operations place upon the system. Grant Fritchey's book is the only in-depth look at how to improve your SQL query performance through careful design of execution plans. Sample chapters of the ebook have garnered stunning reviews, such as: "All I can say is WOW. This has to be the best reference I have ever seen on Execution Plans in SQL Server. My hats off to Grant Fritchey" Jonathan Kehayias.

Implementing SAP ERP Sales & Distribution


Glynn C. Williams - 2008
    Learn how to use SAP ERP Central Component 5.0 and 6.0 to create sales documents and contracts, control material and customer master data, schedule deliveries, and automate billing. You'll also find out how to deliver robust financial and transactional reports, track customer and credit information, and interoperate with other SAP modules.Configure and manage the SAP ERP SD moduleTrack sales, shipping, and payment status using master recordsCreate multi-level sales documents and item proposalsDevelop contracts and rebate agreementsDeliver materials and services requirements to the supply chainPlan deliveries, routes, and packaging using Logistics ExecutionPerform resource-related, collective, and self billingGenerate pricing reports, incompletion logs, and hierarchiesHandle credit limits, payment guarantees, and customer blocksIntegrate user exits, third-party add-ons, and data sharingConfigure pricing procedures and complex pricing condition types

Market Risk Analysis, Practical Financial Econometrics


Carol Alexander - 2008
    It introduces the econometric techniques that are commonly applied to finance with a critical and selective exposition, emphasising the areas of econometrics, such as GARCH, cointegration and copulas that are required for resolving problems in market risk analysis. The book covers material for a one-semester graduate course in applied financial econometrics in a very pedagogical fashion as each time a concept is introduced an empirical example is given, and whenever possible this is illustrated with an Excel spreadsheet. All together, the Market Risk Analysis four volume set illustrates virtually every concept or formula with a practical, numerical example or a longer, empirical case study. Across all four volumes there are approximately 300 numerical and empirical examples, 400 graphs and figures and 30 case studies many of which are contained in interactive Excel spreadsheets available from the the accompanying CD-ROM . Empirical examples and case studies specific to this volume include:Factor analysis with orthogonal regressions and using principal component factors; Estimation of symmetric and asymmetric, normal and Student t GARCH and E-GARCH parameters; Normal, Student t, Gumbel, Clayton, normal mixture copula densities, and simulations from these copulas with application to VaR and portfolio optimization; Principal component analysis of yield curves with applications to portfolio immunization and asset/liability management; Simulation of normal mixture and Markov switching GARCH returns; Cointegration based index tracking and pairs trading, with error correction and impulse response modelling; Markov switching regression models (Eviews code); GARCH term structure forecasting with volatility targeting; Non-linear quantile regressions with applications to hedging.

Simply SQL


Rudy Limeback - 2008
    You'll discover how easy it is to use SQL to interact with best-practice, robust databases. Rather than bore you with theory, it focuses on the practical use of SQL with common databases and uses plenty of diagrams, easy-to-read text, and examples to help make learning SQL easy and fun.Step through the basic SQL syntax Learn how to use best practices in database design Master advanced syntax like inner joins, groups, and subqueries Understand the SQL datatypes And much more...

Advanced ActionScript 3.0 Animation


Keith Peters - 2008
    You now know that you've probably been using Euler integration (and you now know how to pronounce it) and you have a few alternatives available to use. And most importantly, you hopefully have an idea about when to use each one because they all have strengths and weaknesses. Euler, Runge-Kutta, and Verlet are not the only forms of numerical integration. A quick check on Wikipedia brings up this list of interesting sounding names: Backward Euler, Semi-implicit Euler, Velocity Verlet, Beeman's algorithm, Heun's method, Newmark-beta method, Leapfrog integration, and Monte Carlo integration. I have no idea what they all are, but it might be fun to find out. Over to you! Next up, we'll dive into some brand new Flash 10 features regarding 3D! 273 Chapter 7 3D IN FLASH 10 Since I've been involved in Flash, I've seen a new version of the Flash authoring tool, along with a new Flash Player, come out about every 18 months. Shortly after each version is released, the rumors, speculations, and wish lists for what will be in the next version begin. Routinely, one of the longed- for features is native 3D. And just as routinely, hopes are dashed when it doesn't appear. Until Flash 10. You could always do 3D in Flash by scaling and positioning things to make them look like they are nearer or farther away.

Robotics: Modelling, Planning and Control


Bruno Siciliano - 2008
    It has been expanded to include coverage of mobile robots, visual control and motion planning. A variety of problems is raised throughout, and the proper tools to find engineering-oriented solutions are introduced and explained.The text includes coverage of fundamental topics like kinematics, and trajectory planning and related technological aspects including actuators and sensors.To impart practical skill, examples and case studies are carefully worked out and interwoven through the text, with frequent resort to simulation. In addition, end-of-chapter exercises are proposed, and the book is accompanied by an electronic solutions manual containing the MATLAB(r) code for computer problems; this is available free of charge to those adopting this volume as a textbook for courses.

Head First PHP & MySQL


Lynn Beighley - 2008
    Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals of PHP and MySQL coding to advanced topics such as form validation, session IDs, cookies, database queries and joins, file I/O operations, content management, and more.Head First PHP & MySQL offers the same visually rich format that's turned every title in the Head First series into a bestseller, with plenty of exercises, quizzes, puzzles, and other interactive features to help you retain what you've learned.Use PHP to transform static HTML pages into dynamic web sites Create and populate your own MySQL database tables, and work with data stored in files Perform sophisticated MySQL queries with joins, and refine your results with LIMIT and ORDER BY Use cookies and sessions to track visitors' login information and personalize the site for users Protect your data from SQL injection attacks Use regular expressions to validate information on forms Dynamically display text based on session info and create images on the fly Pull syndicated data from other sites using PHP and XML Throughout the book, you'll build sophisticated examples -- including a mailing list, a job board, and an online dating site -- to help you learn how to harness the power of PHP and MySQL in a variety of contexts. If you're ready to build a truly dynamic website, Head First PHP & MySQL is the ideal way to get going.

Head First Java Code Magnets


O'Reilly Media Inc. - 2008
    pWith this Head First Java Code Magnets Kit, getting Java into your brain is both easy and fun. These code magnets provide a brain-friendly, hands-on experience and reduce the time you have to spend writing code. pThe kit includes over 100 magnets with code carefully selected from the code magnet exercises found in O'Reilly Media's best-selling book, iHead First Java, Second Edition/i. Practice your coding skills by using the Java magnets along with the examples found in the book or create your very own examples. pIt's just this simple: break the magnet sheets into separate code tiles and stick them on your fridge, locker, file cabinet, or the magnetic board included in the kit. You'll learn Java in record time!

Optimal Transport: Old and New


Cédric Villani - 2008
    This book presents a broad overview of this area. PhD students or researchers can read the entire book without any prior knowledge of the field.

To Know Where He Lies: DNA Technology and the Search for Srebrenica’s Missing


Sarah E. Wagner - 2008
    To Know Where He Lies provides a powerful account of the innovative genetic technology developed to identify the eight thousand Bosnian Muslim (Bosniak) men and boys found in those graves and elsewhere, demonstrating how memory, imagination, and science come together to recover identities lost to genocide. Sarah E. Wagner explores technology's import across several areas of postwar Bosnian society—for families of the missing, the Srebrenica community, the Bosnian political leadership (including Serb and Muslim), and international aims of social repair—probing the meaning of absence itself.

Pro ASP.NET MVC Framework


Steven Sanderson - 2008
    It introduced a radical high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET 3.5.An integral benefit of this book is that the core Model-View-Controller architectural concepts are not simply explained or discussed in isolation, but demonstrated in action. You'll work through an extended tutorial to create a working e-commerce web application that combines ASP.NET MVC with the latest C# 3.0 language features and unit-testing best practices. By gaining this invaluable, practical experience, you can discover MVCs strengths and weaknesses for yourself--and put your best learned theory into practice.

A Programmer's Guide to Java Scjp Certification: A Comprehensive Primer


Khalid Mughal - 2008
    It is written for any experienced programmer (with or without previous knowledge of Java) interested in mastering the Java programming language and passing the SCJP 1.6 Exam. A Programmer's Guide to Java(TM) SCJP Certification, Third Edition, provides detailed coverage of all exam topics and objectives, readily runnable code examples, programming exercises, extensive review questions, and a new mock exam. In addition, as a comprehensive primer to the Java programming language, this book is an invaluable reference tool. This new edition has been thoroughly updated to focus on the latest version of the exam (CX-310-065). In particular, it contains in-depth explanations of the language features. Their usage is illustrated by way of code scenarios, as required by the exam. The companion Web site (www.ii.uib.no/ khalid/pgjc3e/) contains a version of the SCJP 1.6 Exam Simulator developed by the authors. The site also contains the complete source code for all the book's examples, as well as solutions to the programming exercises.What you will find in this book: Extensive coverage of all the objectives defined for the Sun Certified Programmer for the Java Platform, Standard Edition 6 (CX-310-065) Exam An easy-to-follow structure with chapters organized according to the exam objectives, as laid out by Sun Microsystems Summaries that clearly state and differentiate the exam objectives and the supplementary objectives to be covered in each chapter A list of Sun's objectives for the SCJP 1.6 Exam and a guide to taking the exam A complete mock exam with new questions (not repeats of review questions) Numerous exam-relevant review questions to test your understanding of each major topic, with annotated answers Programming exercises and solutions at the end of each chapter Copious code examples illustrating concepts, where the code has been compiled and thoroughly tested on multiple platforms Program output demonstrating expected results from running the examples Extensive use of UML (Unified Modeling Language) for illustration purposes An introduction to basic terminology and concepts in object-oriented programming Advice on how to avoid common pitfalls in mastering the language and taking the exam Platform- and tool-independent coverage Information about the SCJP 1.6 Upgrade (CX-310-066) Exam

Linux Command Line and Shell Scripting Bible


Richard Blum - 2008
    Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start interacting the fast and efficient way?with command lines and automated scripts. You'll learn how to manage files on the filesystem, start and stop programs, use databases, even do Web programming?without a GUI?with this one-stop resource.

A Primer For The Mathematics Of Financial Engineering


Dan Stefanica - 2008
    The financial applications in the book range from basics such as the Put-Call parity, bond duration and convexity, and the Black-Scholes model, to more advanced topics, such as numerical estimation of the Greeks, implied volatility, and bootstrapping for finding interest rate curves. On the mathematical side, useful but sometimes overlooked topics are presented in detail: differentiating integrals with respect to nonconstant integral limits, numerical approximation of definite integrals, convergence of Taylor series expansions, finite difference approximations, Stirling's formula, Lagrange multipliers, polar coordinates, Newton's method for higher dimensional problems. Every chapter concludes with exercises that are a mix of mathematical and financial questions, with comments regarding their relevance to practice and to more advanced topics.

Elements of Nonequilibrium Statistical Mechanics


V. Balakrishnan - 2008
    Accessible to senior undergraduate students and post-graduate students, this self-contained book offers a choice of topics that enables them to form a coherent picture of the subject. Coverage includes equations and formulas for calculating distribution, diffusion, and dynamic mobility under different conditions. The book concludes with a generalized Langevin equation and the power spectrum of pulse sequences.

Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps


Gene Kim - 2008
    It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned objectives and with development and release teams to integrate security requirements into preproduction work. The Visible Ops Security methodology helps IT organizations move beyond a focus on technology to address the core operational aspects of security. It complements publications that focus on securing the network, access, and data, including COBIT (Control Objectives for Information and related Technology), ISO 27001:2005 (International Standards Organization), and ITIL® (IT Infrastructure Library) manuals. It promotes effective teamwork, which helps security professionals ensure that security is built into key development and production processes. This effort positions the IT organization to meet business needs by delivering highly available, cost-effective, and secure services.

The Ultimate HTML Reference


Ian Lloyd - 2008
    It's the only language that's essential to a web site's very existence. On the surface HTML may seem simple but there's much more to it that meets the eye. With different versions, many infrequently used elements and attributes, and varying ways that browsers interpret the language, only a comprehensive and up-to-date reference, like this book, has it completely covered.The Ultimate HTML Reference is your definitive resource for mastering HTML. The entire language is clearly and concisely covered, along with browser compatibility details, working examples, and easy-to-read descriptions. Authored by one of the world's most renowned HTML experts, this is a comprehensive reference that you'll come back to time and time again.This cross-referenced, easy-to-use book covers: Every element and attribute in the HTML and XHTML Specifications, including an example of its correct useCoverage of deprecated and proprietary elementsDetailed browser compatibility information will save you hours of painful debugging and frustration

Q For Mortals: A Tutorial In Q Programming


Jeffry A. Borror - 2008
    Based on courses taught by the author at major financial institutions, this tutorial is a tested way to learn the features of q. It assumes no specific programming knowledge and presents this complex language with understandable explanations and many hands-on examples. You will be able to read and write q programs when you finish this book. The q language is both a functional programming language and a vector programming language derived from APL. It is particularly well suited to processing very large time series data. Topics covered include: data types; operations and functions; the basic data structures, lists and dictionaries; tables and keyed tables; joins and queries; commands. There is a special section demonstrating typical queries against trade data. There is also a complete reference to all the built-in functions.

The Circuit Designer's Companion


Peter Wilson - 2008
    It looks at best practices, design guidelines, and engineering knowledge gained from years of experience, and includes practical, real-world considerations for components and printed circuit boards (PCBs) as well as their manufacturability, reliability, and cost. Organized into nine chapters, the book begins with a discussion of grounding and wiring of electronic or electrical circuits, when to consider grounding, and the main factors that must be taken into account when designing a new PCB. It then introduces the reader to passive components such as resistors and capacitors, potentiometers and inductors, and crystals and resonators, as well as active components like diodes, thyristors and triacs, bipolar transistors, junction field-effect transistors, metal-oxide-semiconductor field-effect transistors (MOSFETs), and insulated gate bipolar transistors (IGBTs). It also describes high-speed digital circuit design and analog integrated circuits, including operational amplifiers and comparators, and power supplies such as batteries. The final two chapters focus on electromagnetic compatibility and the latest advances in electronics, along with safety considerations in the design of electronic equipment. This book is an invaluable resource for circuit designers and practicing electronics engineers, electronic engineering students, and professors.

Mastering digital photography


Michael Freeman - 2008
    Freeman's own photos illustrate his thinking, with step-by-step worked examples to make the topics accessible and instructive.

IBM Websphere Datapower SOA Appliance Handbook


Bill Hines - 2008
    In this book, a team of IBM's leading experts show how to make the most of DataPower SOA appliances in any IT environment.

The C# Programming Language


Anders Hejlsberg - 2008
    Updated to cover the new features of C# 4.0, including dynamic binding, named and optional parameters, and covariant and contravariant generic types, this release takes the language to the next level by adding the ability to cleanly write programs that don't rely on static type definitions. This allows dynamic programming languages such as Python, Ruby, and JavaScript to feel native to C#. The C# Programming Language, Fourth Edition, continues to be the authoritative and annotated technical reference for C# 4.0. Written by Anders Hejlsberg, the language's architect, and his colleagues, Mads Torgersen, Scott Wiltamuth, and Peter Golde, this volume has been completely updated for C# 4.0. The book provides the complete specification of the language, along with descriptions, reference materials, code samples, and annotations from twelve prominent C# gurus. The many annotations bring a depth and breadth of understanding rarely found in any programming book. As the main text of the book introduces the concepts of the C# language, cogent annotations explain why they are important, how they are used, how they relate to other languages, and even how they evolved. This book is the definitive, must-have reference for any developer who wants to understand C#. With annotations from: Brad Abrams, Joseph Albahari, Krzysztof Cwalina, Jesse Liberty, Eric Lippert, Christian Nagel, Vladimir Reshetnikov, Marek Safar, Chris Sells, Peter Sestoft, Jon Skeet, and Bill Wagner.

Pro ASP.NET 3.5 in C# 2008: Includes Silverlight 2


Matthew MacDonald - 2008
    Pro ASP.NET 3.5 in C# 2008 raises the bar for highquality, practical advice on learning and deploying Microsoft's dynamic web solution.This edition is updated with everything you need to integrate Silverlight 2.0 and SQL Server 2008 into your ASP.NET applications. You will learn about Silverlight's exciting features so that your ASP projects can be rich in visual flair and compelling to the user.Seasoned .NET professionals Matthew MacDonald and Mario Szpuszta explain how you can get the most from this groundbreaking technology. They cover ASP.NET 3.5 as a whole, illustrating both the brandnew features and the functionality carried over from previous versions of ASP. This book will give you the knowledge you need to code real ASP.NET 3.5 applications in the best possible style."

The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws


John B. Stuttard - 2008
    The authors explain each category of vulnerability using real world examples, screen shots and code extracts. This book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks.This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade.

Professional ASP.NET Design Patterns


Scott Millett - 2008
    Design patterns are time-tested solutions to recurring problems, letting the designer build programs on solutions that have already proved effective Provides developers with more than a dozen ASP.NET examples showing standard design patterns and how using them helpsbuild a richer understanding of ASP.NET architecture, as well as better ASP.NET applications Builds a solid understanding of ASP.NET architecture that can be used over and over again in many projects Covers ASP.NET code to implement many standard patterns including Model-View-Controller (MVC), ETL, Master-Master Snapshot, Master-Slave-Snapshot, Facade, Singleton, Factory, Single Access Point, Roles, Limited View, observer, page controller, common communication patterns, and more

After Effects Expressions


Marcus Geduld - 2008
    No programming skills are required. Foundation concepts and skills orient the new designer and serve as a handy reference to the experienced one. Basics of creating Expressions, variables, commands, and Expression helpers precede the leap into JavaScript and math essentials for more advanced Expressions that include randomness and physical simulations. Full color illustrations display the scripts and the resulting effects, Pick Whip techniques, and sequential animations. Downloadable companion files include QuickTime movies of the demo animations, AE project files and more at http: //www.taylorandfrancis.com/cw/geduld-97...

Concurrent Programming on Windows


Joe Duffy - 2008
    . . . This places an emphasis on understanding not only the platform's capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory throughout his book." - From the Foreword by Craig Mundie, Chief Research and Strategy Officer, Microsoft Corporation Author Joe Duffy has risen to the challenge of explaining how to write software that takes full advantage of concurrency and hardware parallelism. In Concurrent Programming on Windows, he explains how to design, implement, and maintain large-scale concurrent programs, primarily using C# and C++ for Windows. Duffy aims to give application, system, and library developers the tools and techniques needed to write efficient, safe code for multicore processors. This is important not only for the kinds of problems where concurrency is inherent and easily exploitable--such as server applications, compute-intensive image manipulation, financial analysis, simulations, and AI algorithms--but also for problems that can be speeded up using parallelism but require more effort--such as math libraries, sort routines, report generation, XML manipulation, and stream processing algorithms. Concurrent Programming on Windows has four major sections: The first introduces concurrency at a high level, followed by a section that focuses on the fundamental platform features, inner workings, and API details. Next, there is a section that describes common patterns, best practices, algorithms, and data structures that emerge while writing concurrent software. The final section covers many of the common system-wide architectural and process concerns of concurrent programming. This is the only book you'll need in order to learn the best practices and common patterns for programming with concurrency on Windows and .NET.

Beginning C# 3.0: An Introduction to Object Oriented Programming


Jack Purdum - 2008
    If you have no prior programming experience but want a thorough, easy-to-understand introduction to C# and Object Oriented Programming, this book is an ideal guide. Using the tutorials and hands-on coding examples, you can discover tried and true tricks of the trade, understand design concepts, employ debugging aids, and design and write C# programs that are functional and that embody safe programming practices.

Harvey Pekar Conversations


Michael G. Rhode - 2008
    Since 1976, Pekar (b. 1939) has reported on his life through his comics. Pekar's comic books deal with his life as a Veterans Administration clerk and freelance music critic; his friends and co-workers and their stories; and his home city of Cleveland. Pekar's struggles with physical and mental problems, a low-paying job, Hollywood, marriage, his daughter's adoption, and success are all laid out in his comics. Pekar prides himself on depicting his life in all its "splendor.""Harvey Pekar: Conversations" offers almost twenty-five years of interviews from a variety of sources including small fanzines, local public radio shows, and the "Washington Post." The volume reveals his thoughts and feelings about comics, autobiography, his appearances on David Letterman's show in the 1980s, his life with cancer, and how a successful 2003 movie adaptation of "American Splendor" has changed and not changed his life. His comics work has won the National Book Award, spawned theatrical productions, and served as the basis for the award-winning movie starring Paul Giamatti as Pekar.Michael G. Rhode is an independent comics scholar and an editor of the "International Journal of Comic Art." His work has been published in the "Comics Journal" and "Hogan's Alley."

Audio Engineering: Know It All


Douglas Self - 2008
    Guaranteed not to gather dust on a shelf!Audio engineers need to master a wide area of topics in order to excel. The Audio Engineering Know It All covers every angle, including digital signal processing, power supply design, microphone and loudspeaker technology as well as audio compression.A 360-degree view from our best-selling authorsIncludes such topics as fundamentals, compression, and test and measurementThe ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

Network Security Technologies and Solutions (CCIE Professional Development Series)


Yusuf Bhaiji - 2008
    

Principles of Corporate Finance Law


Eilís Ferran - 2008
    Corporate finance theory seeks to understand how incorporated firms address the financial constraints that affect their investment decisions by using varied financial instruments that give holders different claims on the firm's assets. Recent scholarship in this area explores precisely how legal mechanisms affect corporate finance and the development of financial markets. The legal environment is crucially important in explaining the choices that companies make about their capital structure.The book examines the key elements of the legal environment relating to corporate finance in the UK. This evolving environment has just undergone a remarkable period of far-reaching change. This was driven in part by the desire of the UK government to modernize its domestic company law, and in part by policy choices at the EU level which rely heavily on the adoption of new regulation to promote closer integration of European financial markets.In this book, Eilis Ferran provides a detailed analysis of the technical issues arising from the new UK and European law on corporate finance, and combines this with exploration of the broader policy framework and with cutting edge theoretical and empirical research.

CCNP Quick Reference


Denise Donohue - 2008
    9566Brent StewartJerold Swan, CCIE No.17783 As a final exam preparation tool, the CCNP Quick Reference provides a concise review of all objectives on the four CCNP exams, including BSCI (642-901), BCMSN (642-812), ISCW (642-825) and ONT (642-845). This book provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. The easy-to-reference format and succinct presentation help you drill on key exam topics. With this document as your guide, you will review topics on routing, switching, secure remote access networks, network security, and quality of service (QoS). This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts. CCNP Quick Reference is part of a recommended learning path from Cisco(R) that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/ authorizedtraining. Denise Donohue, CCIE(R) No. 9566, is manager of Solutions Engineering for ePlus Technology in Maryland. Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Brent Stewart, CCNP(R), CCDP(R), CCSI, MCSE, is a network administrator for CommScope. He is responsible for designing and managing a large-scale worldwide IP network. He participated in the development of BSCI with Cisco and has written and taught extensively on CCNA(R) and CCNP. Jerold Swan, CCIE No. 17783, CCNP, CCSP(R), is a senior network engineer for the Southern Ute Indian Tribe Growth Fund in Ignacio, CO. Prior to that he was a Cisco instructor and course director for Global Knowledge. Complete coverage of all four CCNP exams: - EIGRP, OSPF, IS-IS, and BGP- Optimizing routing- IP multicast- IPv6- VLAN implementation- Spanning Tree- InterVLAN routing- Layer 3 redundancy- Wireless LANs- VoIP in campus networks- Campus network security- Frame-mode MPLS- IPsec- Cisco device hardening- Cisco IOS(R) threat defenses- Cisco VoIP- QoS and AutoQoS- Wireless scalability This volume is part of the Quick Reference series from Cisco Press. Products in this series provide exam candidates with a concise review to help reinforce knowledge of key exam topics. Category: Cisco Press-Cisco CertificationCovers: BSCI (642-901), BCMSN (642-812), ISCW (642-825) and ONT (642-845) $29.99 USA / $32.99 CAN

The Cert C Secure Coding Standard


Robert C. Seacord - 2008
    Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT(R) C Secure Coding Standard fills this need." -Randy Meyers, Chairman of ANSI C "For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. Now CERT has embodied the advice of leading technical experts to give programmers and managers the practical guidance needed to avoid those problems in new applications and to help secure legacy systems. Well done!" -Dr. Thomas Plum, founder of Plum Hall, Inc."Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software." -Chris Tapp, Field Applications Engineer, LDRA Ltd."I've found this standard to be an indispensable collection of expert information on exactly how modern software systems fail in practice. It is the perfect place to start for establishing internal secure coding guidelines. You won't find this information elsewhere, and, when it comes to software security, what you don't know is often exactly what hurts you." -John McDonald, coauthor of The Art of Software Security AssessmentSoftware security has major implications for the operations and assets of organizations, as well as for the welfare of individuals. To create secure software, developers must know where the dangers lie. Secure programming in C can be more difficult than even many experienced programmers believe.This book is an essential desktop reference documenting the first official release of The CERT(R) C Secure Coding Standard . The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.

Network Processors: Architecture, Programming, and Implementation


Ran Giladi - 2008
    Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the underlying theory of networks, network processing, and network processors. It covers implementation of network processors and intergrates EZchip Microcode Development Environment so that you can gain hands-on experience in writing high-speed networking applications. By the end of the book, the reader will be able to write and test applications on a simulated network processor.

Kismet Hacking


Brad Haines - 2008
    Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Altitude Experience: Successful Trekking and Climbing Above 8,000 Feet


Mike Farris - 2008
    This new book also lists preparation and training guidelines for ascending altitude, tips on how to acclimate, what to bring, how to come down after descent, and how to treat altitude sickness if it occurs. This is a practical guide for anyone new to such travel, as well as an up-to-date guide with new information for experienced climbers. Mike Farris is a biology professor at Hamline University and an experienced high-altitude climber who has traveled throughout North America, South America and the Himalayas. He lives in Northfield, Minnesota.

Practical Algorithms for Image Analysis with CD-ROM


Lawrence O'Gorman - 2008
    Drawing on their long experience as users and developers of image analysis algorithms and software, the authors present a description and implementation of the most suitable procedures in easy-to-use form. Each self-contained section treats a single operation, describing typical situations requiring that operation and discussing the algorithm and implementation. Sections start with a "before" and "after" pictorial example and a ready-reference listing typical applications, keywords, and related procedures. This new edition has additional sections on Gabor filtering and on threshholding by connectivity, plus an expanded program listing and suggested projects for classroom use. And now the accompanying CD-ROM contains C programs not only as source code for carrying out the book's procedures but also as executables with a graphical user interface for Windows and Linux.

Programming 8-Bit PIC Microcontrollers in C: With Interactive Hardware Simulation


Martin P. Bates - 2008
    Students and development engineers need to be able to design new products using microcontrollers, and this book explains from first principles how to use the universal development language C to create new PIC based systems, as well as the associated hardware interfacing principles.The book includes many source code listings, circuit schematics and hardware block diagrams. It describes the internal hardware of 8-bit PIC microcontroller, outlines the development systems available to write and test C programs, and shows how to use CCS C to create PIC firmware. In addition, simple interfacing principles are explained, a demonstration program for the PIC mechatronics development board provided and some typical applications outlined.

OpenStreetMap: Using and Enhancing the Free Map of the World


Frederik Ramm - 2008
    Written for novices as well as IT specialists by two experts directly involved with OSM, this guide presents an introduction to the OSM community, the data model, and the software used in the project and offers practical, hands-on advice to contributors and users of OSM geodata. Directions for accessing OSM data and rendering custom maps with Osmarender, Mapnik, and Garmin GPS devices are included, along with a discussion of licensing issues for the maps and techniques for users seeking to run their own OSM servers.

Professional JavaScript Frameworks: Prototype, YUI, Ext JS, Dojo and MooTools


Ara Pehlivanian - 2008
    Over the past few years, there's been a small renaissance in JavaScript as a language. A variety of projects have sprung up to build reusable JS libraries and frameworks -- and at this point, a good number of them have matured and shown staying power that they're worth taking a serious look at and relying on in professional projects.JavaScript has grown in popularity in parallel with the Web and today is supported by all major browsers and new web technologies. JavaScript has been extended over time to deliver high-performing and incredibly impressive Web user experiences, using technologies including Adobe Flash, AJAX, and Microsoft Silverlight.As JavaScript is used increasingly for "serious" development on the Web, the lessons that have been learned and the tools that have been invented along the way are being consolidated and shared by developers in the form of libraries and frameworks. However, since JavaScript is such a flexible and dynamic language, each framework can present very different approaches to the problems of web development -- each with its own pros and cons.Coverage of the individual libraries and frameworks includes:Prototype: Extending and Enhancing DOM Elements Prototype: Handling Cross-Browser Events Prototype: Simplifying AJAX and Dynamic Data Prototype: Working with Forms Prototype: Manipulating Common Data Structures and Functions Prototype: Extending Prototype Yahoo! User Interface Library (YUI): Traversing and Manipulating the DOM with YUI YUI: Handling Cross-Browser Events YUI: Using Animation and Drag and Drop YUI: Simplifying AJAX and Dynamic Loading YUI: Building User Interfaces with Widgets Enhancing Development with the YUI Core YUI: Dealing with Data, Tables, and Charts Working with YUI CSS Tools Building and Deploying YUI ExtJS: Architecture and Library Conventions ExtJS: Elements, DomHelper, and Templates ExtJS: Components, Layouts, and Windows ExtJS: Handling Data and Talking with the Server ExtJS: DataViews and Grids ExtJS: Form Controls, Validation Dojo: Enhancing Development with Dojo Core Dojo: Manipulating the DOM Dojo: Handling Events Dojo: Composing Animations Dojo: Working with AJAX and Dynamic Data Dojo: Building User Interfaces with Widgets Building and Deploying Dojo Expanding Dojo Enhancing Development with MooTools MooTools: Manipulating the DOM and Handling Events MooTools: Simplifying AJAX and Handling Dynamic Data MooTools: Building User Interfaces and Using Animation

Machine Gun: The Development of the Machine Gun from the Nineteenth Century to the Present Day


Maxim Popenker - 2008
    During the First World War, the use of the machine gun in conjunction with massed barbed wire and other obstacles put an end to battlefield mobility until new weapons and tactics could be devised. This book describes the development of the machine gun from the earliest models to the present day. The focus is very much on portable infantry weapons used in the support role, so automatic cannon of 20mm and larger calibres are excluded. The categories of weapon included are, therefore, Light Machine Guns [LMGs], a term which includes the Squad Automatic Weapon [SAW] and Light Support Weapon [LSW]; Medium Machine Guns [MMGs]; Heavy Machine Guns [HMGs] and General Purpose Machine Guns [GPMGs]. One specialist variety of machine guns is included in a separate chapter: the grenade machine gun [GMG], also known as the automatic grenade launcher [AGL]. With a country-by-country breakdown of machine guns, including comprehensive appendices of gun and ammunition data, along with hundreds of photographs, this is a comprehensive study of a most effective battlefield weapon.

Quantum Mechanics for Scientists and Engineers


David A.B. Miller - 2008
    Students will appreciate the book's applied emphasis, which illustrates theoretical concepts with examples of nanostructured materials, optics, and semiconductor devices. The many worked examples and more than 160 homework problems help students to problem solve and to practice applications of theory. Without assuming a prior knowledge of high-level physics or classical mechanics, the text introduces Schrodinger's equation, operators, and approximation methods. Systems, including the hydrogen atom and crystalline materials, are analyzed in detail. More advanced subjects, such as density matrices, quantum optics, and quantum information, are also covered. Practical applications and algorithms for the computational analysis of simple structures make this an ideal introduction to quantum mechanics for students of engineering, physics, nanotechnology, and other disciplines. Additional resources available from www.cambridge.org/9780521897839.

Guide to Advanced Software Testing


Anne Mette Jonassen Hass - 2008
    This book offers a practical understanding of the most critical software testing topics and their relationships and inter-dependencies.

Lectures on Quantum Field Theory


Ashok Das - 2008
    The course starts with relativistic one-particle systems, and develops the basics of quantum field theory with an analysis of the representations of the Poincaré group. Canonical quantization is carried out for scalar, fermion, Abelian and non-Abelian gauge theories. Covariant quantization of gauge theories is also carried out with a detailed description of the BRST symmetry. The Higgs phenomenon and the standard model of electroweak interactions are also developed systematically. Regularization and (BPHZ) renormalization of field theories as well as gauge theories are discussed in detail, leading to a derivation of the renormalization group equation. In addition, two chapters — one on the Dirac quantization of constrained systems and another on discrete symmetries — are included for completeness, although these are not covered in the two-semester course.

Home Networking All-In-One Desk Reference for Dummies


Eric Geier - 2008
    Maybe you've gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue! A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one. It shows you how to choose the right hardware, add user accounts, get different operating systems to work together, secure your network, exchange files, add wireless devices, and even use Wi-Fi out in public. Seven individual, self-contained minibooks cover:What a network will do for you, including a low-tech explanation of how it works Choosing a network type that will work best for your needs, and planning what equipment you'll need Installing and configuring your computers and networking gear Upgrading your equipment with the manufacturer's updates The ins and outs of using particular versions of operating systems -- Windows, Mac, and Linux -- with your network Step-by-step directions on connecting to networks, sharing files and printers, checking connection status, and much more Discovering networking accessories and gadgets to get the most out of your network Finding and using Wi-Fi hotspots, plus setting up your own You'll even find troubleshooting tips to help find and fix common problems. Home Networking All-In-One Desk Reference For Dummies will be your personal network assistant!

Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions


Michael A. Davis - 2008
    It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet ProjectDon't let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkitsPrevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS

Linear Algebra: Theory and Applications


E. Ward Cheney - 2008
    For theoretically-oriented students, the text guides them as they devise proofs and deal with abstractions by focusing on a comprehensive blend between theory and applications. For application-oriented science and engineering students, it contains numerous exercises that help them focus on understanding and learning not only vector spaces, matrices, and linear transformations, but also how software tools are used in applied linear algebra. Using a flexible design, it is an ideal textbook for instructors who wish to make their own choice regarding what material to emphasize, and to accentuate those choices with homework assignments from a large variety of exercises, both in the text and online.

The Game Production Handbook


Heather Maxwell Chandler - 2008
    Fully revised and updated to reflect the rapidly evolving game development landscape, the third edition of this definitive and best-selling text covers pre-production, production, testing, and code release, as well as more specific topics including voiceovers, mo-cap shoots, marketing, localizations, managing external contractors, writing documentation, and project management practices. All-new material in the third edition includes new sections on mobile gaming and product management, an overview of useful production tools, and new interviews with industry professionals who offer an insider's view of successful game development as well as highly relevant real-world examples that contextualize the resources provided by the text. A detailed case study of a fictitious game project illustrates the production cycle, documentation, and other key production concepts. Accessible enough for beginners and comprehensive enough for experienced developers, The Game Production Handbook, Third Edition is an invaluable standalone text for students and professionals alike. Prepare students to successfully enter the exciting world of game development with The Game Production Handbook, Third Edition. New to the Third Edition: -Offers new interviews with industry experts who discuss insider knowledge and real world examples of what works and what doesn't work in game development. -Contains new sections on product management, audio as it relates to the production process, financing options, and the latest relevant production tools.

Modelling Single-Name and Multi-Name Credit Derivatives


Dominic O'Kane - 2008
    It is both a detailed introduction to credit derivative modelling and a reference for those who are already practitioners. This book is up-to-date as it covers many of the important developments which have occurred in the credit derivatives market in the past 4-5 years. These include the arrival of the CDS portfolio indices and all of the products based on these indices. In terms of models, this book covers the challenge of modelling single-tranche CDOs in the presence of the correlation skew, as well as the pricing and risk of more recent products such as constant maturity CDS, portfolio swaptions, CDO squareds, credit CPPI and credit CPDOs.

Linq for Visual C# 2008


Fabio Claudio Ferracchiati - 2008
    With LINQ, you can write more elegant and flexible code--not just to access databases and files, but to manipulate data structures and XML.This book is a short, yet comprehensive guide to the major features of LINQ and the significant enhancements introduced with .NET 3.5. There is no better source for getting a head-start on the future of these technologies than this book.A clear and comprehensive yet concise introduction to using LINQ in C# Covers LINQ to Objects, LINQ to SQL, LINQ to DataSet, and LINQ to XML Rich in working examples of LINQ in action Ideal for C# programmers at any level

Software Pipelines and SOA: Releasing the Power of Multi-Core Processing


Cory Isaacson - 2008
    Improving performance is even more crucial in SOA environments, which demand far more computing power than older architectures. Today's multi-core servers can deliver the performance businesses require, but few applications take full advantage of them. Now, software innovator Cory Isaacson introduces an easier, more flexible approach to parallel processing-one that any IT organization can use to attain unprecedented levels of performance. Isaacson shows how Software Pipeline models can help you scale applications to any level required, maximize resources, deliver on challenging objectives, and achieve unprecedented ROI. He illuminates these techniques with real-life business scenarios and proven design patterns-everything architects, analysts, and developers need to start using them immediately. This book's in-depth coverage includesHow Software Pipelines work, what they can accomplish, and how you can apply them using the Software Pipelines Optimization Cycle (SPOC)Scaling applications via parallel processing while guaranteeing order of processing in mission-critical applicationsSolving performance problems in existing applications, and resolving bottlenecks in existing processesA complete, easy-to-adapt Pipelines Reference FrameworkDetailed code examples reflecting proven Pipelines PatternsTechniques that can be applied in any industry, with any programming languageSpecific architectural and design solutions for common business and technical challengesThe future of Software Pipelines: emerging opportunities for "greenfield" developmentTools, sample templates, and source code at www.informit.com/title/0137137974, Download

Homebrew Wind Power: A Hands-On Guide to Harnessing the Wind


Dan Bartmann - 2008
    Even if you don't plan on building your own turbine, this book is packed with valuable information for anyone considering wind energy. It covers the basic physics of how the energy in moving air is turned into electricity, and most importantly, it will give you a realistic idea of what wind energy can do for you--and what it can't.

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit


Ryan R. Kubasiak - 2008
    Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. The companion DVD contains custom tools developed by the authors, which can be used in real-life digital forensic investigations. MAC Disks, Partitioning, and HFS+ File System Manage multiple partitions on a disk, and understand how the operating system stores data.FileVault and Time Machine Decrypt locked FileVault files and restore files backed up with Leopard's Time Machine.Recovering Browser History Uncover traces of Web-surfing activity in Safari with Web cache and .plist filesRecovering Email Artifacts, iChat, and Other Chat Logs Expose communications data in iChat, Address Book, Apple's Mail, MobileMe, and Web-based email.Locating and Recovering Photos Use iPhoto, Spotlight, and shadow files to find artifacts pof photos (e.g., thumbnails) when the originals no longer exist.Finding and Recovering QuickTime Movies and Other Video Understand video file formats--created with iSight, iMovie, or another application--and how to find them.PDF, Word, and Other Document Recovery Recover text documents and metadata with Microsoft Office, OpenOffice, Entourage, Adobe PDF, or other formats.Forensic Acquisition and Analysis of an iPod Documentseizure of an iPod model and analyze the iPod image file and artifacts on a Mac.Forensic Acquisition and Analysis of an iPhone Acquire a physical image of an iPhone or iPod Touch and safely analyze without jailbreaking. * Companion DVD Contains Custom Materials )Movies, Spreadsheet, Code, Utilities, Etc.) That Can Be Used in a Real Digital Forensic Investigation* Includes Unique Information about Mac OS X, iPod, iMac, and iPhone Forensic Analysis Unavailable Anywhere Else* Authors Are Pioneering Researchers in the Field of Macintosh Forensics, with Combined Experience in Law Enforcement, Military, and Corporate Forensics

Fundamentals of Electric Propulsion: Ion and Hall Thrusters


Dan M. Goebel - 2008
    Now, the future has arrived. This important new book explains the fundamentals of electric propulsion for spacecraft and describes in detail the physics and characteristics of the two major electric thrusters in use today, ion and Hall thrusters. The authors provide an introduction to plasma physics in order to allow readers to understand the models and derivations used in determining electric thruster performance. They then go on to present detailed explanations of:Thruster principlesIon thruster plasma generators and accelerator gridsHollow cathodesHall thrustersIon and Hall thruster plumesFlight ion and Hall thrustersBased largely on research and development performed at the Jet Propulsion Laboratory (JPL) and complemented with scores of tables, figures, homework problems, and references, Fundamentals of Electric Propulsion: Ion and Hall Thrusters is an indispensable textbook for advanced undergraduate and graduate students who are preparing to enter the aerospace industry. It also serves as an equally valuable resource for professional engineers already at work in the field.

Ajax: The Complete Reference


Thomas A. Powell - 2008
    Written by Web development expert Thomas Powell, the book lays out every feature of Ajax alongside detailed explanations and real-world code examples.Ajax: The Complete Reference explains how to create and test Ajax-enabled Web applications using the XMLHttpRequest object as well as alternative JavaScript-based communication mechanisms. You'll explore a variety of sample applications featuring emerging user-interface conventions and build applications that address real-world networking and security issues. A robust communication library is developed throughout the book that enables you to architect flexible Ajax applications. The latest technologies such as Web services, Flash-Ajax integration, client-side templates, Comet, and Offline Access are also covered. Discover the future of Web development today!Work with traditional JavaScript communication approaches like iframesExplore all the quirks and details in the XMLHttpRequest objectHandle disparate data formats, including XML, JSON, CSV, YAML, and more Deal with networking issues, including timeouts, retries, response ordering, and a variety of server and content errorsSimplify JavaScript programming using open-source Ajax libraries like YUISecure Ajax applications using authentication, obfuscation, and encryption Implement common Ajax UI patterns such as auto suggest, click-to-edit, and drag-and-dropSolve troubling Ajax architecture problems, including back button, history, and bookmarking issuesLearn Ajax's role in Web 2.0 and Web servicesExplore push style communication using Comet and FlashDiscover the future of offline Web application access and operation

Professional Windows PowerShell Programming: Snap-Ins, Cmdlets, Hosts, and Providers


Arul Kumaravel - 2008
    The author team of PowerShell experts shows you how PowerShell makes writing code easy by providing a runtime engine with its own parser, plus you?ll discover that with PowerShell, all of the .NET Framework objects become accessible via scripting, making PowerShell a very powerful addition to your toolbox and a popular choice for future development.

FPGA Prototyping By Verilog Examples: Xilinx Spartan-3 Version


Pong P. Chu - 2008
    By following the clear, easy-to-understand templates for code development and the numerous practical examples, you can quickly develop and simulate a sophisticated digital circuit, realize it on a prototyping device, and verify the operation of its physical implementation. This introductory text that will provide you with a solid foundation, instill confidence with rigorous examples for complex systems and prepare you for future development tasks.

Market Risk Analysis: Quantitative Methods in Finance: Quantitative Methods in Finance v. 1 (The Wiley Finance Series)


Carol Alexander - 2008
    Written by leading market risk academic, Professor Carol Alexander, Quantitative Methods in Finance forms part one of the Market Risk Analysis four volume set.

Algorithmic Composition: Paradigms of Automated Music Generation


Gerhard Nierhaus - 2008
    This is the first book to provide a detailed overview of prominent procedures of algorithmic composition in a pragmatic way rather than by treating formalizable aspects in single works. In addition to an historic overview, each chapter presents a specific class of algorithm in a compositional context by providing a general introduction to its development and theoretical basis and describes different musical applications. Each chapter outlines the strengths, weaknesses and possible aesthetical implications resulting from the application of the treated approaches. Topics covered are: markov models, generative grammars, transition networks, chaos and self-similarity, genetic algorithms, cellular automata, neural networks and artificial intelligence are covered. The comprehensive bibliography makes this work ideal for the musician and the researcher alike."