A Whirlwind Tour of Python


Jake Vanderplas - 2016
    This report provides a brief yet comprehensive introduction to Python for engineers, researchers, and data scientists who are already familiar with another programming language.Author Jake VanderPlas, an interdisciplinary research director at the University of Washington, explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.You’ll explore:- Python syntax basics and running Python codeBasic semantics of Python variables, objects, and operators- Built-in simple types and data structures- Control flow statements for executing code blocks conditionally- Methods for creating and using reusable functionsIterators, list comprehensions, and generators- String manipulation and regular expressions- Python’s standard library and third-party modules- Python’s core data science tools- Recommended resources to help you learn more

Working with UNIX Processes


Jesse Storimer - 2011
    Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...

Domain-Driven Design in PHP


Carlos Buenosvinos
    Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.

AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps


Shyam Seshadri - 2014
    By the end of the book, you'll understand how to develop a large, maintainable, and performant application with AngularJS.Guided by two engineers who worked on AngularJS at Google, you'll learn the components needed to build data-driven applications, using declarative programming and the Model-view-controller pattern. You'll also learn how to conduct unit tests on each part of your application.Learn how to use controllers for moving data to and from viewsUnderstand when to use AngularJS services instead of controllersCommunicate with the server to store, fetch, and update data asynchronouslyKnow when to use AngularJS filters for converting data and values to different formatsImplement single-page applications, using ngRoute to select views and navigationDive into basic and advanced directives for creating reusable componentsWrite an end-to-end test on a live version of your entire applicationUse best practices, guidelines, and tools throughout the development cycle

Absolute Beginner's Guide to C


Greg Perry - 1993
    This bestseller talks to readers at their level, explaining every aspect of how to get started and learn the C language quickly. Readers also find out where to learn more about C. This book includes tear-out reference card of C functions and statements, a hierarchy chart, and other valuable information. It uses special icons, notes, clues, warnings, and rewards to make understanding easier. And the clear and friendly style presumes no programming knowledge.

Two Scoops of Django 1.11: Best Practices for the Django Web Framework


Daniel Roy Greenfeld - 2017
    We have put thousands of hours into the fourth edition of the book, writing and revising its material to include significant improvements and new material based on feedback from previous editions.

Ronan O'Gara: Unguarded: My Life in Rugby


Ronan O'Gara - 2013
         Ronan O'Gara has been at the heart of Munster and Irish rugby for the past fifteen years. Now, as he comes to the end of a glittering playing career, it is time for him to reflect on those many successes and occasional failures with the straight-talking attitude that has become his trademark. Never one to shy away from the truth, the result is Ronan O'Gara: Unguarded.     Packed full of anecdotes and analysis of the teammates O'Gara has been proud to share the shirt with, and of the coaches he has played under -- often in controversial circumstances -- this is the definitive record of an era when Munster rose to triumph in Europe, and Ireland to win the Grand Slam, before crashing down to earth again. It is simply the must-have rugby book of the year.

Manifesto: A Revolutionary Approach to General Aviation Maintenance


Mike Busch - 2014
    Written in typical no-nonsense style, it lays out the basis of Mike's “minimalist” maintenance philosophy for owner-flown general aviation aircraft. An owner who follows the book's guidance can save a small fortune on maintenance costs and end up with a safer, more reliable aircraft.Owners are advised to perform the absolute least amount of maintenance required to make their aircraft safe, reliable and legal… and nothing more. The book explains in detail why engine and propeller TBOs and most other manufacturer-prescribed maintenance intervals should be disregarded. And “Manifesto” explains exactly how to do it.About the Author:Mike Busch is arguably the best-known A&P/IA in general aviation. In 2008, he was honored by the FAA as “National Aviation Maintenance Technician of the Year.” Mike has been a prolific aviation writer for more than four decades. His “Savvy Aviator” columns have appeared in numerous publications including EAA Sport Aviation, AOPA’s Opinion Leader’s Blog, AVweb, and magazines for the three largest GA type clubs (ABS, CPA, and COPA). He is renowned for his free monthly maintenance webinars and his standing-room-only forums at EAA AirVenture Oshkosh. Mike has been a pilot and aircraft owner for 45 years with 7,500+ hours logged, and he is a CFIA/I/ME. He’s founder and CEO of Savvy Aircraft Maintenance Management, Inc., the world’s largest firm providing maintenance-management services for owner-flown aircraft.

The Haunting of the Hadleigh Estate: Book 0


Conner Donnelly - 2018
    But when she gets terrible news that takes her back her uncle’s home there she finds that the town isn’t as innocent as her childhood memories would have her believe. Strange things start to happen in the old house and soon enough Cassie is forced to deal with some hard truths.

Slanted


H.L. Wegley - 2019
    When she finds an orphaned girl, Sam, hidden in some bushes along the Rogue River, in an instant, a bond is formed. AJ quickly learns that Sam's and her guardian's lives are in danger from a team of hired killers. But AJ commits to helping eight-year-old Sam. A competitive athlete, AJ Scott isn't one to quit, give up, or do anything halfway, not even when she and Sam end up in a road race with killers in pursuit.When Hunter Jones's cousin dies, he becomes eight-year-old Samantha Wilson's guardian and sets aside any pursuit of personal happiness. Sam becomes his lot in life, and he loves her dearly. But Hunter, a big data analyst, will soon release a research report proving that the largest Internet search engine in the world is being used by its owners to influence American political thought with the intent of controlling elections. He hints at his findings in a radio interview and the news goes viral. Within hours, a team of hired killers attacks Hunter and Sam, intending to eliminate them and steal his research findings. Hunter hides Sam and eludes the killers. But when he returns, Sam is gone. Enraged, Hunter Jones will storm the gates of Hades to get her back, and whoever took her will pay a steep price.Set in Southern Oregon, Seattle, Washington DC, and Eastern Oregon, near Paulina Lake, Slanted is a gritty, high-action, romantic suspense adventure about commitment, sacrifice, love and faith.

Woody Allen: Interviews


Robert E. Kapsis - 2006
    1935) is one of America's most idiosyncratic filmmakers, with an unparalleled output of nearly one film every year for over three decades. His movies are filled with rapid-fire one-liners, neurotic characters, anguished relationships, and old-time jazz music. Allen's vision of New York--whether in comedies or dramas--has shaped our perception of the city more than any other modern filmmaker. "On the screen," John Lahr wrote in the New Yorker in 1996, "Allen is a loser who makes much of his inadequacy; off-screen, he has created over the years the most wide-ranging oeuvre in American entertainment."Woody Allen: Interviews collects over twenty-five years of interviews with the director of Manhattan, Hannah and Her Sisters, Crimes and Misdemeanors, Bullets Over Broadway, and Annie Hall, for which he won an Oscar. The book's interviews reveal a serious director, often at odds with his onscreen persona as a lovable, slap-stick loser. Allen talks frankly about his rigorous work habits; his biggest artistic influences; the attention he devotes to acting, screenwriting, and directing; and how New York fuels his filmmaking.Along with discussing film techniques and styles, Allen opens up about his love of jazz, his Jewish heritage, and the scandal that arose when he left his longtime partner Mia Farrow for her adopted daughter. Including four interviews from European sources, three of which are now available in English for the first time, Woody Allen: Interviews is a treasure trove of conversations with one of America's most distinctive filmmakers.Robert E. Kapsis is professor of sociology at Queens College and is the author of Hitchcock: The Making of a Reputation. His work has appeared in the Village Voice, Variety, Journal of Popular Film and Video, and Cineaste and at the Museum of Modern Art. Kathie Coblentz is special collections cataloger at the New York Public Library. Kapsis and Coblentz coedited Clint Eastwood: Interviews (University Press of Mississippi).

Fundamentals of Data Structures in C++


Ellis Horowitz - 1995
    Fundamentals of Data Structures in C++ offers a complete rendering of basic data structure implementations, enhanced by superior pedagogy and astute analyses.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

With British Snipers to the Reich


C. Shore - 1988
    Captain Shore’s enthusiasm for firearms and especially for rifles led him to take every possible opportunity to try out different weapons, ammunition and methods of shooting. His interest was combined with sound common sense, and he would never countenance a rumour about a particular weapon or incident unless he was able to confirm it for himself.As a result everything in this book is based on his personal experience. In World War II Captain Shore took part in the British landings at D-Day, and fought in Normandy and northern Europe. He came across many different weapons in varying condition, some of the worst being those used by the Dutch and Belgian resistance fighters. He was keen to learn from experienced snipers and then to train others, and he became an officer sniping instructor at the British Army of the Rhine Training Centre.He shares a wealth of first-hand knowledge of different rifles, pistols, machine guns, ammunition, telescopes, binoculars and all the equipment a sniper should carry. This is not only an account of sniping in World War II but also a guide to all aspects of sniping based on personal knowledge and experience in training and battle. Illustrated heavily with photos, pictures and other illustrations of snipers, their weapons and their tactics.

Real-Time Big Data Analytics: Emerging Architecture


Mike Barlow - 2013
    The data world was revolutionized a few years ago when Hadoop and other tools made it possible to getthe results from queries in minutes. But the revolution continues. Analysts now demand sub-second, near real-time query results. Fortunately, we have the tools to deliver them. This report examines tools and technologies that are driving real-time big data analytics.