Book picks similar to
The Inform Designer's Manual by Graham Nelson
nonfiction
non-fiction
reference
wish
Baseball For Dummies
Joe Morgan - 1998
Baseball Hall of Fame player and ESPN baseball analyst Joe Morgan explains baseball with remarkable insight, using down-to-earth language so everyone from the casual observer to the die-hard fan can gain a fuller appreciation of the sport. This updated edition features:Everything you need to know about the game, from what it takes to play each position and how to hit and run the bases to what to watch for in the game and how to appreciate the finer points of the sport Coverage of new star players, new stadiums, and game milestones The lowdown on today's baseball Web resources The latest on stats and sabermetrics The inside story on the new steroid rules From how to throw a knuckleball or hit an inside pitch to how to keep a scorecard or pick a winning fantasy league team, Morgan covers all the bases, showing you how to get the most out of the game. You'll see how to:Improve your hitting, pitching, and fielding Find a team to play on, from Little League on up Evaluate stats, players, and records Coach or umpire effectively Get more out of a trip to the ballpark Complete with Morgan's personal lists of top-ten pitchers, fielders, and relievers, as well as new quotes from Derek Jeter and Keith Hernandez, Baseball For Dummies gives you all the inside tips, facts, and stats so you can play like a Major Leaguer!
Real World Haskell: Code You Can Believe In
Bryan O'Sullivan - 2008
You'll learn how to use Haskell in a variety of practical ways, from short scripts to large and demanding applications. Real World Haskell takes you through the basics of functional programming at a brisk pace, and then helps you increase your understanding of Haskell in real-world issues like I/O, performance, dealing with data, concurrency, and more as you move through each chapter. With this book, you will:Understand the differences between procedural and functional programming Learn the features of Haskell, and how to use it to develop useful programs Interact with filesystems, databases, and network services Write solid code with automated tests, code coverage, and error handling Harness the power of multicore systems via concurrent and parallel programming You'll find plenty of hands-on exercises, along with examples of real Haskell programs that you can modify, compile, and run. Whether or not you've used a functional language before, if you want to understand why Haskell is coming into its own as a practical language in so many major organizations, Real World Haskell is the best place to start.
MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements
Dan HolmeMelissa Craft - 2003
Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only
Computer Systems: A Programmer's Perspective
Randal E. Bryant - 2002
Often, computer science and computer engineering curricula don't provide students with a concentrated and consistent introduction to the fundamental concepts that underlie all computer systems. Traditional computer organization and logic design courses cover some of this material, but they focus largely on hardware design. They provide students with little or no understanding of how important software components operate, how application programs use systems, or how system attributes affect the performance and correctness of application programs. - A more complete view of systems - Takes a broader view of systems than traditional computer organization books, covering aspects of computer design, operating systems, compilers, and networking, provides students with the understanding of how programs run on real systems. - Systems presented from a programmers perspective - Material is presented in such a way that it has clear benefit to application programmers, students learn how to use this knowledge to improve program performance and reliability. They also become more effective in program debugging, because t
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein - 2011
In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin D. Mitnick - 2017
Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
Project Management Lite: Just Enough to Get the Job Done...Nothing More
Juana Clark Craig - 2012
This easy-to-use, step-by-step, plain English guide to project management shows readers how to hit ground running.For beginners who find themselves in charge of a project but have no clue where to start or those who are struggling or feel overwhelmed, Project Management Lite focuses less on the theory and more on the action with simple worksheets and checklists.Author Juana Clark Craig, PMP, draws on over twenty-five years of project management experience gained while working in Fortune 500 companies to deliver a minimalistic approach to managing your projects without the mumbo-jumbo of traditional project management techniques.
The Adsense Code: What Google Never Told You about Making Money with Adsense
Joel Comm - 2005
For those who know the secret, the result is untold wealth. Each month, a small group of people - an elite club who have uncovered the mysteries of The AdSense Code- put their knowledge to use and receive checks for tens of thousands of dollars from Google. And untold numbers of additional site owners are regularly generating supplemental income via AdSense while they play, sleep and eat. The AdSense Code is concise and very focused on the objective of revealing the proven online strategies to creating passive income with Google AdSense. The AdSense Code reveals hands-on solutions to many of the concerns and challenges faced by content publishers in their quest to attract targeted traffic, improve content relevance and increase responsiveness to AdSense ads - using easy and legitimate techniques that have worked for those who know the secrets. Google AdSense expert, Joel Comm, provides you with the keys you need to ""crack"" The AdSense Code and unlock the secrets to making money online.
Game Programming Patterns
Robert Nystrom - 2011
Commercial game development expert Robert Nystrom presents an array of general solutions to problems encountered in game development. For example, you'll learn how double-buffering enables a player to perceive smooth and realistic motion, and how the service locator pattern can help you provide access to services such as sound without coupling your code to any particular sound driver or sound hardware. Games have much in common with other software, but also a number of unique constraints. Some of the patterns in this book are well-known in other domains of software development. Other of the patterns are unique to gaming. In either case, Robert Nystrom bridges from the ivory tower world of software architecture to the in-the-trenches reality of hardcore game programming. You'll learn the patterns and the general problems that they solve. You'll come away able to apply powerful and reusable architectural solutions that enable you to produce higher quality games with less effort than before. Applies classic design patterns to game programming. Introduces new patterns specific to game programming. Brings abstract software architecture down to Earth with approachable writing and an emphasis on simple code that shows each pattern in practice. What you'll learn Overcome architectural challenges unique to game programming Apply lessons from the larger software world to games. Tie different parts of a game (graphics, sound, AI) into a cohesive whole. Create elegant and maintainable architecture. Achieve good, low-level performance. Gain insight into professional, game development. Who this book is forGame Programming Patterns is aimed at professional game programmers who, while successful in shipping games, are frustrated at how hard it sometimes is to add and modify features when a game is under development. Game Programming Patterns shows how to apply modern software practices to the problem of game development while still maintaining the blazing-fast performance demanded by hard-core gamers. Game Programming Patterns also appeals to those learning about game programming in their spare time. Hobbyists and aspiring professionals alike will find much to learn in this book about pathfinding, collision detection, and other game-programming problem domains.
Bill W.: A Biography of Alcoholics Anonymous Cofounder Bill Wilson
Francis Hartigan - 2000
Bob Smith, founded Alcoholics Anonymous in 1935, his hope was that AA would become a safe haven for those who suffered from this disease. Thirty years after his death, AA continues to help millions of alcoholics recover from what had been commonly regarded as a hopeless addiction. Still, while Wilson was a visionary for millions, he was no saint. After cofounding Alcoholics Anonymous, he stayed sober for over thirty-five years, helping countless thousands rebuild their lives. But at the same time, Wilson suffered form debilitating bouts of clinical depression, was a womanizer, and experimented with LSD.Francis Hartigan, the former secretary and confidant to Wilson's wife, Lois, has exhaustively researched his subject, writing with a complete insider's knowledge. Drawing on extensive interviews with Lois Wilson and scores of early members of AA, he fully explores Wilson's organizational genius, his devotion to the cause, and almost martyr-like selflessness. That Wilson, like all of us, had to struggle with his own personal demons makes this biography all the more moving and inspirational. Hartigan reveals the story of Wilson's life to be as humorous, horrific, and powerful as any of the AA vignettes told daily around the world.
Programming in Lua
Roberto Ierusalimschy - 2001
Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is the official book about the language, giving a solid base for any programmer who wants to use Lua. Authored by Roberto Ierusalimschy, the chief architect of the language, it covers all aspects of Lua 5---from the basics to its API with C---explaining how to make good use of its features and giving numerous code examples. "Programming in Lua" is targeted at people with some programming background, but does not assume any prior knowledge about Lua or other scripting languages. This Second Edition updates the text to Lua 5.1 and brings substantial new material, including numerous new examples, a detailed explanation of the new module system, and two new chapters centered on multiple states and garbage collection.
Attack of the Flickering Skeletons: More Terrible Old Games You’ve Probably Never Heard Of
Stuart Ashen - 2017
You will probably wish you still didn’t.YouTube sensation Stuart Ashen is back with his second instalment of terrible old computer games you’ve probably never heard of... because what the world needs right now is to know exactly how bad Domain of the Undead for the Atari 8-bit computers was.Attack of the Flickering Skeletons is even bigger than the original Terrible Old Games You’ve Probably Never Heard Of – this second excavation of gaming’s buried past will not only unearth more appalling excuses for digital entertainment, but also feature guest contributors and several special interest chapters not based around single specific games.These are NOT the games you’ve heard of a million times in YouTube videos. This is a compilation of truly obscure and dreadful games. Dripping with wry humour and featuring the best, worst graphics from the games themselves, this book encapsulates the atrocities produced in the days of tight budgets and low quality controls.These are even more appalling games that leaked from the industry’s tear ducts, taken down from the dusty shelves of history by the man who has somehow made a living by sticking rubbish on a sofa and talking about it.
Design Patterns: Elements of Reusable Object-Oriented Software
Erich Gamma - 1994
Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves.The authors begin by describing what patterns are and how they can help you design object-oriented software. They then go on to systematically name, explain, evaluate, and catalog recurring designs in object-oriented systems. With Design Patterns as your guide, you will learn how these important patterns fit into the software development process, and how you can leverage them to solve your own design problems most efficiently. Each pattern describes the circumstances in which it is applicable, when it can be applied in view of other design constraints, and the consequences and trade-offs of using the pattern within a larger design. All patterns are compiled from real systems and are based on real-world examples. Each pattern also includes code that demonstrates how it may be implemented in object-oriented programming languages like C++ or Smalltalk.
Psychnotes: Clinical Pocket Guide
Darlene D. Pedersen - 2005
The 4th Edition of this AJN Book-of-the-Year award winner has been thoroughly updated to deliver even more resources and tools, plus new DSM-5 content. "Psych Notes is packed with all of the essential content necessary to REVIEW (you should also have expanded knowledge of this content) and pass the ANCC PMHNP certification exam. You will be astonished with the depth and breadth of information contained in this easy to read and use (spiral bound) book. Be sure to access the online information that accompanies this book, too as it contains a grid comparing the changes from DSM-IV and DSM-5!" --Sandra Hannon-Engel, Ph.D., RN, CNS, PMHNP, Assistant Professor, William F. Connell School of Nursing, Boston College, Boston, MA. "It's a pretty good book for both nursing students and practicing RN's. No matter what specialty you're in you'll come across patients that are psychologically unstable and this book gives you a quick and easy reference to your needs. Everything is laid out in simple form and focuses on the most pertinent topics in psych." - Jim Astapan, Amazon.com "Very good source for fast references." - Ileana, Amazon.com "An amazingly complete collection of all that pertains to psych/mental health care. An easy to use resource and a wonderful review." - Camille Grosso, Ph.D., R.N.
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic