Book picks similar to
Introduction to Radio Frequency Design by Wes H. Hayward
amateur-radio
upstairs
books-wantex
electronics
Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning With New Media
Mizuko ItoDilan Mahendran - 2009
Yet there is little actual research that investigates the intricate dynamics of youths' social and recreational use of digital media. "Hanging Out, Messing Around, and Geeking Out" fills this gap, reporting on an ambitious three-year ethnographic investigation into how young people are living and learning with new media in varied settings -- at home, in after-school programs, and in online spaces. Integrating twenty-three case studies -- which include Harry Potter podcasting, video-game playing, music sharing, and online romantic breakups -- in a unique collaborative authorship style, " Hanging Out, Messing Around, and Geeking Ou"t is distinctive for its combination of in-depth description of specific group dynamics with conceptual analysis.
Making Embedded Systems: Design Patterns for Great Software
Elecia White - 2011
This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements.Written by an expert who’s created embedded systems ranging from urban surveillance and DNA scanners to children’s toys, this book is ideal for intermediate and experienced programmers, no matter what platform you use.Optimize your system to reduce cost and increase performanceDevelop an architecture that makes your software robust in resource-constrained environmentsExplore sensors, motors, and other I/O devicesDo more with less: reduce RAM consumption, code space, processor cycles, and power consumptionLearn how to update embedded code directly in the processorDiscover how to implement complex mathematics on small processorsUnderstand what interviewers look for when you apply for an embedded systems job"Making Embedded Systems is the book for a C programmer who wants to enter the fun (and lucrative) world of embedded systems. It’s very well written—entertaining, even—and filled with clear illustrations." —Jack Ganssle, author and embedded system expert.
Making Games with Python & Pygame
Al Sweigart - 2012
Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.
The Logic of American Politics
Samuel Kernell - 1999
political system.
Objective-C Programming: The Big Nerd Ranch Guide
Aaron Hillegass - 2011
This is a hands-on guide to mastering Objective C - the language every MAC OS X and iPhone/iPod Touch developer needs to know.
Digital Design and Computer Architecture
David Money Harris - 2007
Digital Design and Computer Architecture begins with a modern approach by rigorously covering the fundamentals of digital logic design and then introducing Hardware Description Languages (HDLs). Featuring examples of the two most widely-used HDLs, VHDL and Verilog, the first half of the text prepares the reader for what follows in the second: the design of a MIPS Processor. By the end of Digital Design and Computer Architecture, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works--even if they have no formal background in design or architecture beyond an introductory class. David Harris and Sarah Harris combine an engaging and humorous writing style with an updated and hands-on approach to digital design.Unique presentation of digital logic design from the perspective of computer architecture using a real instruction set, MIPS.Side-by-side examples of the two most prominent Hardware Design Languages--VHDL and Verilog--illustrate and compare the ways the each can be used in the design of digital systems.Worked examples conclude each section to enhance the reader's understanding and retention of the material.
Cloud Computing for Dummies
Judith Hurwitz - 2009
If you've been put in charge of implementing cloud computing, this straightforward, plain-English guide clears up the confusion and helps you get your plan in place.You'll learn how cloud computing enables you to run a more green IT infrastructure, and access technology-enabled services from the Internet ("in the cloud") without having to understand, manage, or invest in the technology infrastructure that supports them. You'll also find out what you need to consider when implementing a plan, how to handle security issues, and more.Cloud computing is a way for businesses to take advantage of storage and virtual services through the Internet, saving money on infrastructure and support This book provides a clear definition of cloud computing from the utility computing standpoint and also addresses security concerns Offers practical guidance on delivering and managing cloud computing services effectively and efficiently Presents a proactive and pragmatic approach to implementing cloud computing in any organization Helps IT managers and staff understand the benefits and challenges of cloud computing, how to select a service, and what's involved in getting it up and running Highly experienced author team consults and gives presentations on emerging technologies Cloud Computing For Dummies gets straight to the point, providing the practical information you need to know.
Maximum Boost: Designing, Testing and Installing Turbocharger Systems
Corky Bell - 1997
Find out what works and what doesnt, which turbo is right for your needs, and what type of set-up will give you that extra boost. Bell shows you how to select and install the right turbo, how to prep your engine, test the systems, and integrate a turbo with EFI or carbureted engine.
The Portable MLIS: Insights from the Experts
Ken Haycock - 2008
This foundation to the profession covers the competencies needed by professional librarians and can serve as both introduction to the new student and an update to the veteran.Typically, interested laypeople and students are introduced to the knowledge, skills, and abilities of professional librarians piecemeal or through introductory or core courses. Unlike other fields (e.g., business administration, management), there is no published broad overview of the profession. Almost peculiarly, the basic foundation course in LIS education is about information in context, or libraries and their mission, but not about the competencies of professional librarians as a foundation for future courses.This book fills that gap, whether as an introduction to the profession or as a response to the question What does a librarian do?Here, experts in several fields of library and information science provide introductions to their areas of expertise, covering the competencies needed by professional librarians. Accessible and comprehensive, The Portable MLIS can serve as both an introduction for the new student and an update for the veteran.
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang - 2003
The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.
AWS Lambda: A Guide to Serverless Microservices
Matthew Fuller - 2016
Lambda enables users to develop code that executes in response to events - API calls, file uploads, schedules, etc - and upload it without worrying about managing traditional server metrics such as disk space, memory, or CPU usage. With its "per execution" cost model, Lambda can enable organizations to save hundreds or thousands of dollars on computing costs. With in-depth walkthroughs, large screenshots, and complete code samples, the reader is guided through the step-by-step process of creating new functions, responding to infrastructure events, developing API backends, executing code at specified intervals, and much more. Introduction to AWS Computing Evolution of the Computing Workload Lambda Background The Internals The Basics Functions Languages Resource Allocation Getting Set Up Hello World Uploading the Function Working with Events AWS Events Custom Events The Context Object Properties Methods Roles and Permissions Policies Trust Relationships Console Popups Cross Account Access Dependencies and Resources Node Modules OS Dependencies OS Resources OS Commands Logging Searching Logs Testing Your Function Lambda Console Tests Third-Party Testing Libraries Simulating Context Hello S3 Object The Bucket The Role The Code The Event The Trigger Testing When Lambda Isn’t the Answer Host Access Fine-Tuned Configuration Security Long-Running Tasks Where Lambda Excels AWS Event-Driven Tasks Scheduled Events (Cron) Offloading Heavy Processing API Endpoints Infrequently Used Services Real-World Use Cases S3 Image Processing Shutting Down Untagged Instances Triggering CodeDeploy with New S3 Uploads Processing Inbound Email Enforcing Security Policies Detecting Expiring Certificates Utilizing the AWS API Execution Environment The Code Pipeline Cold vs. Hot Execution What is Saved in Memory Scaling and Container Reuse From Development to Deployment Application Design Development Patterns Testing Deployment Monitoring Versioning and Aliasing Costs Short Executions Long-Running Processes High-Memory Applications Free Tier Calculating Pricing CloudFormation Reusable Template with Minimum Permissions Cross Account Access CloudWatch Alerts AWS API Gateway API Gateway Event Creating the Lambda Function Creating a New API, Resource, and Method Initial Configuration Mapping Templates Adding a Query String Using HTTP Request Information Within Lambda Deploying the API Additional Use Cases Lambda Competitors Iron.io StackHut WebTask.io Existing Cloud Providers The Future of Lambda More Resources Conclusion
Computer Organization & Design: The Hardware/Software Interface
David A. Patterson - 1993
More importantly, this book provides a framework for thinking about computer organization and design that will enable the reader to continue the lifetime of learning necessary for staying at the forefront of this competitive discipline. --John Crawford Intel Fellow Director of Microprocessor Architecture, Intel The performance of software systems is dramatically affected by how well software designers understand the basic hardware technologies at work in a system. Similarly, hardware designers must understand the far reaching effects their design decisions have on software applications. For readers in either category, this classic introduction to the field provides a deep look into the computer. It demonstrates the relationship between the software and hardware and focuses on the foundational concepts that are the basis for current computer design. Using a distinctive learning by evolution approach the authors present each idea from its first principles, guiding readers through a series of worked examples that incrementally add more complex instructions until they ha
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Python Algorithms: Mastering Basic Algorithms in the Python Language
Magnus Lie Hetland - 2010
Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques.The book deals with some of the most important and challenging areas of programming and computer science, but in a highly pedagogic and readable manner. The book covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others himself.
The Audible Past: Cultural Origins of Sound Reproduction
Jonathan Sterne - 2002
It describes a distinctive sound culture that gave birth to the sound recording and the transmission devices so ubiquitous in modern life. With an ear for the unexpected, scholar and musician Jonathan Sterne uses the technological and cultural precursors of telephony, phonography, and radio as an entry point into a history of sound in its own right. Sterne studies the constantly shifting boundary between phenomena organized as "sound" and "not sound." In The Audible Past, this history crisscrosses the liminal regions between bodies and machines, originals and copies, nature and culture, and life and death. Blending cultural studies and the history of communication technology, Sterne follows modern sound technologies back through a historical labyrinth. Along the way, he encounters capitalists and inventors, musicians and philosophers, embalmers and grave robbers, doctors and patients, deaf children and their teachers, professionals and hobbyists, folklorists and tribal singers. The Audible Past tracks the connections between the history of sound and the defining features of modernity: from developments in medicine, physics, and philosophy to the tumultuous shifts of industrial capitalism, colonialism, urbanization, modern technology, and the rise of a new middle class.A provocative history of sound, The Audible Past challenges theoretical commonplaces such as the philosophical privilege of the speaking subject, the visual bias in theories of modernity, and static descriptions of nature. It will interest those in cultural studies, media and communication studies, the new musicology, and the history of technology.