Book picks similar to
Scientific Forth by Julian V. Noble
compsci
computer-science
interesting
james-hague-five-memorable-books-pr
Computer Science Distilled: Learn the Art of Solving Computational Problems
Wladston Ferreira Filho - 2017
Designed for readers who don't need the academic formality, it's a fast and easy computer science guide. It teaches essential concepts for people who want to program computers effectively. First, it introduces discrete mathematics, then it exposes the most common algorithms and data structures. It also shows the principles that make computers and programming languages work.
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham - 2004
Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Microsoft Windows Internals: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
Mark E. Russinovich - 2004
This classic guidefully updated for Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensionsdescribes the architecture and internals of the Windows operating system. You’ll find hands-on experiments you can use to experience Windows internal behavior firsthand, along with advanced troubleshooting information to help you keep your systems running smoothly and efficiently. Whether you’re a developer or a system administrator, you’ll find critical architectural insights that you can quickly apply for better design, debugging, performance, and support.Get in-depth, inside knowledge of the Windows operating system: Understand the key mechanisms that configure and control Windows, including dispatching, startup and shutdown, and the registry Explore the Windows security model, including access, privileges, and auditing Investigate internal system architecture using the kernel debugger and other tools Examine the data structures and algorithms that deal with processes, threads, and jobs Observe how Windows manages virtual and physical memory Understand the operation and format of NTFS, and troubleshoot file system access problems View the Windows networking stack from top to bottom, including mapping, APIs, name resolution, and protocol drivers Troubleshoot boot problems and perform crash analysis
Clojure Applied: From Practice to Practitioner
Ben Vandgrift - 2015
You want to develop software in the most effective, efficient way possible. This book gives you the answers you’ve been looking for in friendly, clear language.We’ll cover, in depth, the core concepts of Clojure: immutable collections, concurrency, pure functions, and state management. You’ll finally get the complete picture you’ve been looking for, rather than dozens of puzzle pieces you must assemble yourself. First, we focus on Clojure thinking. You’ll discover the simple architecture of Clojure software, effective development processes, and how to structure applications. Next, we explore the core concepts of Clojure development. You’ll learn how to model with immutable data; write simple, pure functions for efficient transformation; build clean, concurrent designs; and structure your code for elegant composition. Finally, we move beyond pure application development and into the real world. You’ll understand your application’s configuration and dependencies, connect with other data sources, and get your libraries and applications out the door.Go beyond the toy box and into Clojure’s way of thinking. By the end of this book, you’ll have the tools and information to put Clojure’s strengths to work.https://pragprog.com/book/vmclojeco/c...
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Designing Event-Driven Systems
Ben Stopford - 2018
Many of these patterns are successful by themselves, but as this practical ebook demonstrates, they provide a more holistic and compelling approach when applied together.Author Ben Stopford explains how service-based architectures and stream processing tools such as Apache Kafka® can help you build business-critical systems.* Learn why streaming beats request-response based architectures in complex, contemporary use cases* Understand why replayable logs such as Kafka provide a backbone for both service communication and shared datasets* Explore how event collaboration and event sourcing patterns increase safety and recoverability with functional, event-driven approaches* Apply patterns including Event Sourcing and CQRS, and how to build multi-team systems with microservices and SOA using patterns such as “inside out databases” and “event streams as a source of truth”* Build service ecosystems that blend event-driven and request-driven interfaces using a replayable log and Kafka's Streams API* Scale beyond individual teams into larger, department- and company-sized architectures, using event streams as a source of truth
Feynman Lectures On Computation
Richard P. Feynman - 1996
Feynman gave his famous course on computation at the California Institute of Technology, he asked Tony Hey to adapt his lecture notes into a book. Although led by Feynman, the course also featured, as occasional guest speakers, some of the most brilliant men in science at that time, including Marvin Minsky, Charles Bennett, and John Hopfield. Although the lectures are now thirteen years old, most of the material is timeless and presents a “Feynmanesque” overview of many standard and some not-so-standard topics in computer science such as reversible logic gates and quantum computers.
On the Path of Vengeance: A Historical Western Adventure Book
Austin Grayson - 2019
Soon he discovers that a man called Ambrose Shaughnessy owns the family ranch now,and he's raising Ross' baby sister as his own. He immediately cooks up a plan to work on the ranch undercover for a chance to investigate his family's mysterious fate and get revenge for everything he's lost.Even the best-laid plans can go ashtray though. When things do not turn out to be what they appear, Ross is left to question his motives for revenge. On top of that, he unexpectedly finds himself falling for Shaughnessy's sweet, caring daughter. Will Ross be able to discover what happened to his family and bring justice to those responsible, or will his judgement be clouded by unexpected forces? Will the two lovers unite, or will they have to repeat the cursed events that brought them together, and might still put them both in the ground?An action-packed story of deception and delusion, love and lust, violence and compassion, featuring fascinating characters and twists that will leave the reader breathless. A must-read for fans of Western action and romance."On the Path of Vengeance" is a historical adventure novel of approximately 80,000 words. No cliffhangers, just unadulterated action.
Hands-On Machine Learning with Scikit-Learn and TensorFlow
Aurélien Géron - 2017
Now that machine learning is thriving, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how.By using concrete examples, minimal theory, and two production-ready Python frameworks—Scikit-Learn and TensorFlow—author Aurélien Géron helps you gain an intuitive understanding of the concepts and tools for building intelligent systems. You’ll learn how to use a range of techniques, starting with simple Linear Regression and progressing to Deep Neural Networks. If you have some programming experience and you’re ready to code a machine learning project, this guide is for you.This hands-on book shows you how to use:Scikit-Learn, an accessible framework that implements many algorithms efficiently and serves as a great machine learning entry pointTensorFlow, a more complex library for distributed numerical computation, ideal for training and running very large neural networksPractical code examples that you can apply without learning excessive machine learning theory or algorithm details
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier - 1993
… The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
Foundations of Software Testing: ISTQB Certification
Dorothy Graham - 2006
The coverage also features learning aids.
Mudras for Weight Loss: 21 Simple Hand Gestures for Effortless Weight Loss: [Discover the Secrets of Effortless Weight Loss, Escape the Diet trap and Transform your Life Forever] ('Mudras' Book 3)
Advait - 2014
Have you been reading book after book on Weight Loss, Trying one Diet After another only to have no positive results whatsoever? Then, this book is for you!! Have you been trying to get rid of fattening toxins from your body and boost your metabolism? Then, this book is for you!! Have you been trying to keep up with a Weight Loss regimen, but simply are not able to maintain the required discipline and will-power to keep going? Then, this book is for you!! Have you been trying to stay away from Fatty and Salty foodstuffs, but are not able to curb your craving and still end up eating them(cause they taste divine!)? Then, this book is for you!! Are you low on Self-Confidence, just because you have put on weight...and want to feel good about yourself since you have taken positive steps to shed that excess weight? Then, this book is for you!! All this is possible by performing Simple Hand Gestures called as 'Mudras'. You don't believe me?? Try out for yourself. These Weight Loss Mudras work wonders!! Discover:: 21 Simple Hand Gestures for Effortless Weight Loss This book details a variety of Simple Hand Gestures called as Mudras, that when performed regularly will burn away your excess weight, remove fattening toxins from your body, boost your metabolism, curb your unhealthy cravings, induce a strong will-power to continue this Weight Loss regimen. Some of the Mudras that you’ll discover inside this book are: # Lingamudra / Mudra of Divine Masculine # Apaanmudra / Mudra of Downward Force # Chakramudra / Mudra of Wheel # Avaahanmudra / Mudra of calling # Shankhamudra / Mudra of conch Effortless Weight Loss is possible!! Just perform these Simple Hand Gestures regularly. Would You Like To Know More? Download now and achieve effortless, non-reversing Weight Loss. Scroll to the top of the page and select the buy button. P.S - This Book is enrolled in 'KINDLE UNLIMITED', If you are a Kindle Unlimited Subscriber, Download this book for FREE, and I bet, you will buy it afterwards for your collection and reference.
Daily Routine Mastery: How to Create the Ultimate Daily Routine for More Energy, Productivity, and Success - Have Your Best Day Every Day
Dominic Mann - 2017
From energizing morning routines, to insanely efficient work routines, to empowering evening rituals, the ultra-successful structure their days to utilize every last waking minute to its fullest potential. And in this book, you will learn how to do the same. How will you learn to create the ultimate daily routine? Inside the book:
The secret to creating the ultimate morning routine so you can have your best day every day (Hint: It has 3 parts)
How to get more done with an ultra-efficient work routine (plus the ultimate work routine for squeezing every last drop of potential out of your work hours)
How to renew your energy throughout the day with an “energy ritual” for all-day energy and productivity (plus how to schedule tasks according to your energy levels)
Why having cold showers every morning can leave you feeling more energized, happy, and productive
The secret to waking up feeling energized (Hint: It has nothing to do with how long you sleep for)
How to finish your day with a powerful evening routine so you can kick ass the next day (plus an example of a great evening ritual you can copy)
And much more… To create a powerful daily routine and perform at the peak of your abilities day in and day out, scroll up to the top of this page and click BUY NOW.
Avenging Amy
Annabelle Winters - 2021
. . ANNABELLE WINTERS STYLE!When a brash Saudi prince takes liberties with State Department translator Amy Hadad, she’s told to forget it and move on, to be a patriot and swallow her personal pride for the sake of the bigger picture.Saudi Prince Rafiq is helping the US in a delicate hostage situation with the rogue extremist nation of Jawal, and so Amy is stuck with an impossible choice: If she accuses Prince Rafiq, he might not help the US, and hostages might die.It’s not just an impossible choice, it’s no choice at all.She has to stand down, keep her mouth shut, smile for the camera, and let the show go on.Navy SEAL Jake Axelrod, busted down to security detail for a loudmouthed Senator after running his own mouth off in public, is used to choosing his country over himself.It’s what he was born to do, trained to do, loves to do.But when he senses how Amy reacts to Prince Rafiq at a State Department Gala in Dubai, something awakens in him, something comes alive, a different sense of moral duty that burns strong in his heart, like it comes from someplace deep and ancient, from a time when a man's highest duty was to protect his woman.Soon Axe faces his own impossible choice, and he makes it with his heart instead of his head.An eye for an eye leaves the whole world blind, they say.Well, even a blind man knows when the sun is shining, and that’s what it feels like around Amy.So what the hell.Who needs eyes when your future's so clear.Hooyah.Toe-curling suspense, button-popping steam, mind-breaking action. And of course over-the-top drama and madness, Annabelle Winters style. This is a full length standalone.
Love Against All Odds
Carol Colyer - 2019
Answering a rancher's mail-order bride ad, she hopes to escape an arranged marriage, a deal struck in order to save her father's ailing business. Dan Gallagher struggles to keep the ranch that his belated father left behind alive. His hardships with his brother, and his loneliness lead him to send for a mail order bride. He hasn't even seen her, nor has she, which makes it even more difficult for them to meet. When an unexpected situation starts to unravel, can Kathleen finally find love on her own terms?Love Finally Takes ControlAmy Louise decides to leave her home in order to find a new life and a man she had never met. To her surprise though, she finds Oliver, the man she has come to meet unconscious on the bed! Turns out, Oliver's friendship with a member of the Apache, as well as prejudice, has created all sorts of rumors on his regard. When his intended bride arrives, will he be able to prove himself to be a good man and suitable husband for her?A Love Kept Apart by LiesWhen she discovers her late husband has drank their fortune away, Rose is forced to leave her home, in search of her last living male relative. She needs his help to handle her financial affairs. What happens when she realizes that he was killed only a while ago? Surprisingly, she finds herself falling for the town Marshall, who may know more than he lets on about her cousin's mysterious death. Their attraction is undeniable, but unfortunate events conspire to keep each one of them on their solitary path. Will this continual push-pull battle between the two of them come to an end? If you love clean Western romances that feature strong women of the era and determined, yet charming, male protagonists, then you are going to love this collection!Each book is a standalone, clean and delightful story of approximately 80,000 words. No cheating, no cliffhangers, and a sweet happily ever after.