Planet Google: One Company's Audacious Plan to Organize Everything We Know


Randall E. Stross - 2008
    His revelations demystify the strategy behind the company's recent flurry of bold moves, all driven by the pursuit of a business plan unlike any other: to become the indispensable gatekeeper of all the world's information, the one-stop destination for all our information needs. Will Google succeed? And what are the implications of a single company commanding so much information and knowing so much about us? As ambitious as Google's goal is, with 68 percent of all Web searches (and growing), profits that are the envy of the business world, and a surplus of talent, the company is, Stross shows, well along the way to fulfilling its ambition, becoming as dominant a force on the Web as Microsoft became on the PC. Google isn't just a superior search service anymore. In recent years it has launched a dizzying array of new services and advanced into whole new businesses, from the introductions of its controversial Book Search and the irresistible Google Earth, to bidding for a slice of the wireless-phone spectrum and nonchalantly purchasing YouTube for $1.65 billion. Google has also taken direct aim at Microsoft's core business, offering free e-mail and software from word processing to spreadsheets and calendars, pushing a transformative -- and highly disruptive -- concept known as "cloud computing." According to this plan, users will increasingly store all of their data on Google's massive servers -- a network of a million computers that amounts to the world's largest supercomputer, with unlimited capacity to house all the information Google seeks. The more offerings Google adds, and the more ubiquitous a presence it becomes, the more dependent its users become on its services and the more information they contribute to its uni

Calculus [with CD]


Howard Anton - 1992
    New co-authors--Irl Bivens and Stephen Davis--from Davidson College; both distinguished educators and writers.* More emphasis on graphing calculators in exercises and examples, including CAS capabilities of graphing calculators.* More problems using tabular data and more emphasis on mathematical modeling.

Learn Python The Hard Way


Zed A. Shaw - 2010
    The title says it is the hard way to learn to writecode but it’s actually not. It’s the “hard” way only in that it’s the way people used to teach things. In this book youwill do something incredibly simple that all programmers actually do to learn a language: 1. Go through each exercise. 2. Type in each sample exactly. 3. Make it run.That’s it. This will be very difficult at first, but stick with it. If you go through this book, and do each exercise for1-2 hours a night, then you’ll have a good foundation for moving on to another book. You might not really learn“programming” from this book, but you will learn the foundation skills you need to start learning the language.This book’s job is to teach you the three most basic essential skills that a beginning programmer needs to know:Reading And Writing, Attention To Detail, Spotting Differences.

Concepts, Techniques, and Models of Computer Programming


Peter Van Roy - 2004
    The book focuses on techniques of lasting value and explains them precisely in terms of a simple abstract machine. The book presents all major programming paradigms in a uniform framework that shows their deep relationships and how and where to use them together.After an introduction to programming concepts, the book presents both well-known and lesser-known computation models ("programming paradigms"). Each model has its own set of techniques and each is included on the basis of its usefulness in practice. The general models include declarative programming, declarative concurrency, message-passing concurrency, explicit state, object-oriented programming, shared-state concurrency, and relational programming. Specialized models include graphical user interface programming, distributed programming, and constraint programming. Each model is based on its kernel language—a simple core language that consists of a small number of programmer- significant elements. The kernel languages are introduced progressively, adding concepts one by one, thus showing the deep relationships between different models. The kernel languages are defined precisely in terms of a simple abstract machine. Because a wide variety of languages and programming paradigms can be modeled by a small set of closely related kernel languages, this approach allows programmer and student to grasp the underlying unity of programming. The book has many program fragments and exercises, all of which can be run on the Mozart Programming System, an Open Source software package that features an interactive incremental development environment.

Target Band 7: How to Maximize Your Score (IELTS Academic Module)


Simone Braverman - 2008
    All the tips, techniques, strategies and advice are focused on maximizing students’ score by increasing their task-solving speed and efficiency, and preventing typical mistakes.

Domain-Specific Languages


Martin Fowler - 2010
    In Domain-Specific Languages , noted software development expert Martin Fowler first provides the information software professionals need to decide if and when to utilize DSLs. Then, where DSLs prove suitable, Fowler presents effective techniques for building them, and guides software engineers in choosing the right approaches for their applications. This book's techniques may be utilized with most modern object-oriented languages; the author provides numerous examples in Java and C#, as well as selected examples in Ruby. Wherever possible, chapters are organized to be self-standing, and most reference topics are presented in a familiar patterns format. Armed with this wide-ranging book, developers will have the knowledge they need to make important decisions about DSLs--and, where appropriate, gain the significant technical and business benefits they offer. The topics covered include: - How DSLs compare to frameworks and libraries, and when those alternatives are sufficient - Using parsers and parser generators, and parsing external DSLs - Understanding, comparing, and choosing DSL language constructs - Determining whether to use code generation, and comparing code generation strategies - Previewing new language workbench tools for creating DSLs

Computer Organization & Design: The Hardware/Software Interface


David A. Patterson - 1993
    More importantly, this book provides a framework for thinking about computer organization and design that will enable the reader to continue the lifetime of learning necessary for staying at the forefront of this competitive discipline. --John Crawford Intel Fellow Director of Microprocessor Architecture, Intel The performance of software systems is dramatically affected by how well software designers understand the basic hardware technologies at work in a system. Similarly, hardware designers must understand the far reaching effects their design decisions have on software applications. For readers in either category, this classic introduction to the field provides a deep look into the computer. It demonstrates the relationship between the software and hardware and focuses on the foundational concepts that are the basis for current computer design. Using a distinctive learning by evolution approach the authors present each idea from its first principles, guiding readers through a series of worked examples that incrementally add more complex instructions until they ha

C++ For Dummies


Stephen Randy Davis - 1994
    "C++ For Dummies, 5th Edition," debunks the myths, blasts the barriers, shares the secrets, and gets you started. In fact, by the end of Chapter 1, you'll be able to create a C++ program. OK, it won't be newest, flashiest video game, but it might be a practical, customized inventory control or record-keeping program.Most people catch on faster when they actually DO something, so "C++ For Dummies" includes a CD-ROM that gives you all you need to start programming (except the guidance in the book, of course), including: Dev-C, a full-featured, integrated C++ compiler and editor you install to get down to businessThe source code for the programs in the book, including code for BUDGET, programs that demonstrate principles in the bookDocumentation for the Standard Template LibraryOnline C++ help filesWritten by Stephen Randy Davis, author of "C++ Weekend Crash Course, C++ for Dummies, " takes you through the programming process step-by-step. You'll discover how to: Generate an executableCreate source code, commenting it as you go and using consistent code indentation and naming conventionsWrite declarations and name variables, and calculate expressionsWrite and use a function, store sequences in arrays, and declare and use pointer variablesUnderstand classes and object-oriented programmingWork with constructors and destructorsUse inheritance to extend classesUse stream I/OComment your code as you go, and use consistent code indentation and naming conventionsAutomate programming with the Standard Template Library (STL)"C++ for Dummies 5th Edition" is updated for the newest ANSI standard to make sure you're up to code.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

@War: The Rise of the Military-Internet Complex


Shane Harris - 2014
    In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

Programming in Scala


Martin Odersky - 2008
     Coauthored by the designer of the Scala language, this authoritative book will teach you, one step at a time, the Scala language and the ideas behind it. The book is carefully crafted to help you learn. The first few chapters will give you enough of the basics that you can already start using Scala for simple tasks. The entire book is organized so that each new concept builds on concepts that came before - a series of steps that promises to help you master the Scala language and the important ideas about programming that Scala embodies. A comprehensive tutorial and reference for Scala, this book covers the entire language and important libraries.

Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET


Tony Stubblebine - 2007
    Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries. This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:Supported metacharacters for each language API Regular expression classes and interfaces for Ruby, Java, .NET, and C# Regular expression operators for Perl 5.8 Regular expression module objects and functions for Python Pattern-matching functions for PHP and the vi editor Pattern-matching methods and objects for JavaScript Unicode Support for each of the languages With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Machine Learning: A Visual Starter Course For Beginner's


Oliver Theobald - 2017
     If you have ever found yourself lost halfway through other introductory materials on this topic, this is the book for you. If you don't understand set terminology such as vectors, hyperplanes, and centroids, then this is also the book for you. This starter course isn't a picture story book but does include many visual examples that break algorithms down into a digestible and practical format. As a starter course, this book connects the dots and offers the crash course I wish I had when I first started. The kind of guide I wish had before I started taking on introductory courses that presume you’re two days away from an advanced mathematics exam. That’s why this introductory course doesn’t go further on the subject than other introductory books, but rather, goes a step back. A half-step back in order to help everyone make his or her first strides in machine learning and is an ideal study companion for the visual learner. In this step-by-step guide you will learn: - How to download free datasets - What tools and software packages you need - Data scrubbing techniques, including one-hot encoding, binning and dealing with missing data - Preparing data for analysis, including k-fold Validation - Regression analysis to create trend lines - Clustering, including k-means and k-nearest Neighbors - Naive Bayes Classifier to predict new classes - Anomaly detection and SVM algorithms to combat anomalies and outliers - The basics of Neural Networks - Bias/Variance to improve your machine learning model - Decision Trees to decode classification Please feel welcome to join this starter course by buying a copy, or sending a free sample to your preferred device.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Doing Data Science


Cathy O'Neil - 2013
    But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to Data Science class, tells you what you need to know.In many of these chapter-long lectures, data scientists from companies such as Google, Microsoft, and eBay share new algorithms, methods, and models by presenting case studies and the code they use. If you’re familiar with linear algebra, probability, and statistics, and have programming experience, this book is an ideal introduction to data science.Topics include:Statistical inference, exploratory data analysis, and the data science processAlgorithmsSpam filters, Naive Bayes, and data wranglingLogistic regressionFinancial modelingRecommendation engines and causalityData visualizationSocial networks and data journalismData engineering, MapReduce, Pregel, and HadoopDoing Data Science is collaboration between course instructor Rachel Schutt, Senior VP of Data Science at News Corp, and data science consultant Cathy O’Neil, a senior data scientist at Johnson Research Labs, who attended and blogged about the course.