Book picks similar to
Computer Graphics Programming in OpenGL Using C++ by V. Scott Gordon
programming
999
art-design
computer-science
Bash Cookbook: Solutions and Examples for Bash Users
Carl Albing - 2007
Scripting is a way to harness and customize the power of any Unix system, and it's an essential skill for any Unix users, including system administrators and professional OS X developers. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards.bash Cookbook teaches shell scripting the way Unix masters practice the craft. It presents a variety of recipes and tricks for all levels of shell programmers so that anyone can become a proficient user of the most common Unix shell -- the bash shell -- and cygwin or other popular Unix emulation packages. Packed full of useful scripts, along with examples that explain how to create better scripts, this new cookbook gives professionals and power users everything they need to automate routine tasks and enable them to truly manage their systems -- rather than have their systems manage them.
Interactive Data Visualization for the Web
Scott Murray - 2013
It’s easy and fun with this practical, hands-on introduction. Author Scott Murray teaches you the fundamental concepts and methods of D3, a JavaScript library that lets you express data visually in a web browser. Along the way, you’ll expand your web programming skills, using tools such as HTML and JavaScript.This step-by-step guide is ideal whether you’re a designer or visual artist with no programming experience, a reporter exploring the new frontier of data journalism, or anyone who wants to visualize and share data.Learn HTML, CSS, JavaScript, and SVG basicsDynamically generate web page elements from your data—and choose visual encoding rules to style themCreate bar charts, scatter plots, pie charts, stacked bar charts, and force-directed layoutsUse smooth, animated transitions to show changes in your dataIntroduce interactivity to help users explore data through different viewsCreate customized geographic maps with dataExplore hands-on with downloadable code and over 100 examples
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
Richard Caddick - 2011
This indispensible and full-color book provides practical guidance on this growing field and shares valuable UX advice that you can put into practice immediately on your own projects. The authors examine why UX is gaining so much interest from web designers, graduates, and career changers and looks at the new UX tools and ideas that can help you do your job better. In addition, you'll benefit from the unique insight the authors provide from their experiences of working with some of the world's best-known companies, learning how to take ideas from business requirements, user research, and documentation to create and develop your UX vision.Explains how to create documentation that clearly communicates the vision for the UX design and the blueprint for how it's going to be developed Provides practical guidance that you can put to work right away on their own projects Looks at the new UX tools and ideas that are born every day, aimed at helping you do your job better and more efficiently Covers a variety of topics including user journeys, task models, funnel diagrams, content audits, sitemaps, wireframes, interactive prototypes, and more Communicating the User Experience is an ideal resource for getting started with creating UX documentation.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Subterranean Scalzi Super Bundle
John Scalzi - 2012
Subterranean Press bundles together all of their John Scalzi titles into one easy-to-buy special this November:How I Proposed To My Wife: An Alien Sex StoryAn ElectionJudge Sn Goes GolfingQuestions for a SoldierThe Sagan DiaryThe Tale of the WickedThe God EnginesYou're Not fooling Anyone When You Take Your Laptop to the Coffee Shop
Head First JavaScript Programming
Eric Freeman - 2014
Want to understand that code you've been copying and pasting into your web pages? And do it in a way that won't put you to sleep? Then Head First JavaScript Programming is for you. Learning a programming language is no easy task, but Head First JavaScript Programming uses puzzles, visuals, mysteries, interviews, and fun examples to make learning JavaScript fast, fun, and effective. But don't be fooled; you might be having a good time while you're learning JavaScript, but you're still learning all the serious stuff. Like how functions and objects work, what a callback is, how to interact with the web page using the Document Object Model, how to use arrays, and even what a closure is. JavaScript is one of the most popular languages in the world, and it's only getting more popular as the Web continues to grow. Learn JavaScript the Head First way, and get in on all the action.
The Earl and the Highwayman's Daughter
Maggi Andersen - 2012
Outsmarting her father, the earl takes Eugenia to live in his beautiful country estate, Lilac Court. But what does he really want from her? It seems there’s a mystery attached to an emerald necklace, which he wishes her to wear at a London ball. Could Eugenia be the daughter of a powerful duke, but born on the wrong side of the blanket? Her mother refused to tell her. As Brendan, Earl of Trentham, works to bring down a hated foe, he and his sister instruct Eugenia in the ways of the ton. She is beautiful and, despite the cloud over her birth, will be desired by many men. Why doesn’t that prospect make him happy? A Reader's Opinion "The Earl and the Highwayman's Daughter is indeed a Cinderella story with Eugenia as our young beauty and the Earl as her "prince." I was delighted to spend a few hours with the characters while they navigated their way through society's dos and don'ts, all in the name of hope and sweet romance." Books & Benches
Beginning Python: From Novice to Professional
Magnus Lie Hetland - 2005
Based on "Practical Python," this newly-revised book is both an introduction and practical reference for a swath of Python-related programming topics, including addressing language internals, database integration, network programming, and web services. Advanced topics, such as extending Python and packaging/distributing Python applications, are also covered.Ten different projects illustrate the concepts introduced in the book. You will learn how to create a P2P file-sharing application and a web-based bulletin board, and how to remotely edit web-based documents and create games. Author Magnus Lie Hetland is an authority on Python and previously authored "Practical Python." He also authored the popular online guide, Instant Python Hacking, on which both books are based.
Spear of Shadows
Joshua Reynolds - 2017
The Ruinous Powers hunt them – and so do a group of heroes, chosen by Grungni for this dangerous and essential task.READ IT BECAUSEIt's a different kind of Age of Sigmar story, and the first of a trilogy, at that! A classic quest story with a disparate group of heroes drawn together by fate and unimaginable consequences if they fail… sounds unmissable.THE STORYIn the beginning, there was fire. And from fire came eight weapons of terrible power, honed to a killing edge by the chosen weaponsmiths of Khorne. Now, as the Mortal Realms echo with the thunder of war, the great powers hunt the eight wherever they might be found – whatever the cost. In a city of prophecy and secrets, Grungni, smith-god of the duardin, gathers together a group of mortal warriors from across the realms in order to seek the first of the eight. But they are not alone in their quest; agents of the Ruinous Powers want the weapon for themselves. Now the race is on, as man, duardin and daemon alike seek to claim the Spear of Shadows...
The Complete Beast House Chronicles
Richard Laymon - 2012
For the first time in one edition, Richard Laymon's acclaimed Beast House Series: The Cellar, The Beast House, The Midnight Tour and Friday Night in Beast House.The deeper you go into the Beast House, the darker the nightmares become. If you have nerves of steel and are looking for excitement and adventure, why not take the tour? But don't even think about going into the cellar...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
Runs in the Family
Kevin Ikenberry - 2014
With little hope of leaving the outer rim of the Milky Way, Mairin agrees to participate in a classified experiment offering her genetic perfection and a chance to see the galaxy. Now, armed with her great-grandfather's military knowledge and combat-refined instincts, Mairin is tasked with leading inexperienced troops in a war against a shadowy enemy using hauntingly familiar tactics. But the first rule of the military is "hurry up and wait," and Mairin learns this firsthand. Without transport to the fight, Mairin spends the downtime on a lush paradise world, getting to know her new body, her imprint, and her heart. Mairin meets Tallenaara, a beautiful Styrahi architect whose mission and past will come to challenge them both. Faced with the most difficult choice of her young life, Mairin Shields can only watch as her world spins out of control.
What's New in Java 7?
Madhusudhan Konda - 2011
Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.
Unbonded
D.K. Holmberg - 2021
Trained from a young age to destroy those who wield it. The First of the Blade Series begins.Trained to destroy sorcery from a young age, Imogen Inaratha left that life behind, having come to see magic differently. When her brother asks for help, she embarks on a dangerous journey—and must face a part of her past she wanted to forget.An encounter with one of the mythical Porapeth changes the course of the journey. Protecting him forces her to face dark magical creatures and a powerful sorcerer determined to destroy the Porapeth in his quest for even more power.To succeed, she must learn the truth of the blade she’d long thought she’d mastered.She must truly become the First of the Blade.