Book picks similar to
Computer Parables: Enlightenment In The Information Age by Geoffrey James
computer-science
cs-theory
inventory
Novel Pictorial Noise
Noah Eli Gordon - 2007
For over twenty years, the National Poetry Series has discovered many new and emerging voices and has been instrumental in launching the careers of poets and writers such as Billy Collins, Mark Doty, Denis Johnson, Cole Swensen, Thylias Moss, Mark Levine, and Dionisio Martinez.
Maven: The Definitive Guide
Timothy O'Brien - 2008
Now there's help. The long-awaited official documentation to Maven is here. Written by Maven creator Jason Van Zyl and his team at Sonatype, Maven: The Definitive Guide clearly explains how this tool can bring order to your software development projects. Maven is largely replacing Ant as the build tool of choice for large open source Java projects because, unlike Ant, Maven is also a project management tool that can run reports, generate a project website, and facilitate communication among members of a working team. To use Maven, everything you need to know is in this guide. The first part demonstrates the tool's capabilities through the development, from ideation to deployment, of several sample applications -- a simple software development project, a simple web application, a multi-module project, and a multi-module enterprise project. The second part offers a complete reference guide that includes:The POM and Project Relationships The Build Lifecycle Plugins Project website generation Advanced site generation Reporting Properties Build Profiles The Maven Repository Team Collaboration Writing Plugins IDEs such as Eclipse, IntelliJ, ands NetBeans Using and creating assemblies Developing with Maven ArchetypesSeveral sources for Maven have appeared online for some time, but nothing served as an introduction and comprehensive reference guide to this tool -- until now. Maven: The Definitive Guide is the ideal book to help you manage development projects for software, web applications, and enterprise applications. And it comes straight from the source.
Resurrection Update: Collected Poems, 1975-1997
James Galvin - 1997
The complete works of an extraordinary poet who consistently refines the notion of what constitutes an American sound.
Red Sugar
Jan Beatty - 2008
D. A. Powell What is it about the poems in Red Sugar, Jan Beatty's astonishing third collection, that brings to mind the incomparable music of Miles Davis? 'It's just that I can't play like anybody else... I can't do anything like anybody else, ' Davis insisted. These poems go their own sure way, making their own fierce music, charting 'the fluid stages of / empire & slavery' in the human body, yours and mine, as we rehearse our sometimes sorry but always necessary seductions. Jan Beatty is the author of Boneshaker and Mad River, winner of the 1994 Agnes Lynch Starrett Poetry Prize. She is the recipient of the Pablo Neruda Prize for Poetry and two fellowships from the Pennsylvania Council on the Arts
Hello, Android: Introducing Google's Mobile Development Platform
Ed Burnette - 2008
In a few years, it's expected to be found inside millions of cell phones and other mobile devices, making Android a major platform for application developers. That could be your own program running on all those devices.Getting started developing with Android is easy. You don't even need access to an Android phone, just a computer where you can install the Android SDK and the phone emulator that comes with it. Within minutes, "Hello, Android" will get you creating your first working application: Android's version of "Hello, World."From there, you'll build up a more substantial example: an Android Sudoku game. By gradually adding features to the game throughout the course of the book, you'll learn about many aspects of Android programming including user interfaces, multimedia, and the Android life cycle.If you're a busy developer who'd rather be coding than reading about coding, this book is for you. To help you find what you need to know fast, each chapter ends with "Fast forward" section. These sections provide guidance for where you should go next when you need to read the book out of order.
SEO 2016: Learn Search Engine Optimization (SEO Books Series)
R.L. Adams - 2015
It's certainly no walk in the park. And, depending on where you've been for your information when it comes to SEO, it might be outdated, or just flat-out wrong. Why is that? Search has been evolving at an uncanny rate in recent years. And, if you're not in the know, then you could end up spinning your wheels and wasting valuable and precious time and resources on techniques that no longer work. The main reason for the recent changes: to increase relevancy. Google's sole mission is to provide the most relevant search results at the top of its searches, in the quickest manner possible. But, in recent years, due to some mischievous behavior at the hand of a small group of people, relevancy began to wane. SEO 2016 :: Understanding Google's Algorithm Adjustments The field of SEO has been changing, all led by Google's onslaught of algorithm adjustments that have decimated and razed some sites while uplifting and building others. Since 2011, Google has made it its mission to hunt out and demote spammy sites that sacrifice user-experience, focus on thin content, or simply spend their time trying to trick and deceive their way to the top of its search results. At the same time, Google has increased its reliance on four major components of trust, that work at the heart of its search algorithm: Trust in Age Trust in Authority Trust in Content Relevancy In this book, you'll learn just how each of these affects Google's search results, and just how you can best optimize your site and content to ensure that you're playing by Google's many rules. And, although there have been many algorithm adjustments over the years, four major ones have shaped and forever changed the search engine landscape: Google Panda Google Penguin Google Hummingbird Google Mobilegeddon We'll discuss the nature of these changes and just how each of these algorithm adjustments have shaped the current landscape in search engine optimization. So what does it take to rank your site today? In order to compete at any level in SEO, you have to earn trust - Google's trust that is. But, what does that take? How can we build trust quickly without jumping through all the hoops? SEO is by no means a small feat. It takes hard work applied consistently overtime. There are no overnight success stories when it comes to SEO. But there are certainly ways to navigate the stormy online waters of Google's highly competitive search. Download SEO 2016 :: Learn Search Engine Optimization Lift the veil on Google's complex search algorithm, and understand just what it takes to rank on Google searches today, not yesterday.
A Call to Colors
John J. Gobbell - 2006
It will take 165,000 troops and 700 ships in the bloody battle of Leyte Gulf to do it.
Among them is the destroyer USS Matthew and her skipper, Commander Mike Donovan, a veteran haunted by earlier savage battles. What Donovan doesn’t know is that Vice Admiral Takao Kurita of Japan has laid an ingenious trap as the Matthew heads for the treacherous waters of Leyte Gulf. But Donovan faces something even deadlier than Kurita’s battleships: Explosives secretly slipped on board American ships by saboteurs are set to detonate at any time. Now the Matthew’s survival hinges on the ability of Donovan and his men to dismantle a bomb in the midst of the panic and the chaos of history’s greatest naval battle.“Gobbell’s sea tales . . . will have you looking up your nearest Navy recruiter.” —W.E.B. Griffin“[John Gobbell is] a first-rate storyteller.” — Stephen Coonts“Wonderful . . . a rousing dramatization of history’s greatest sea battle.” — James D. Hornfischer, author of The Last Stand of the Tin Can Sailors
Making Things Talk: Practical Methods for Connecting Physical Objects
Tom Igoe - 2007
But when devices that you've built start to talk to each other, things really start to get interesting. Through a series of simple projects, you'll learn how to get your creations to communicate with one another by forming networks of smart devices that carry on conversations with you and your environment. Whether you need to plug some sensors in your home to the Internet or create a device that can interact wirelessly with other creations, Making Things Talk explains exactly what you need. This book is perfect for people with little technical training but a lot of interest. Maybe you're a science teacher who wants to show students how to monitor weather conditions at several locations at once, or a sculptor who wants to stage a room of choreographed mechanical sculptures. Making Things Talk demonstrates that once you figure out how objects communicate -- whether they're microcontroller-powered devices, email programs, or networked databases -- you can get them to interact. Each chapter in contains instructions on how to build working projects that help you do just that. You will:Make your pet's bed send you email Make your own seesaw game controller that communicates over the Internet Learn how to use ZigBee and Bluetooth radios to transmit sensor data wirelessly Set up communication between microcontrollers, personal computers, and web servers using three easy-to-program, open source environments: Arduino/Wiring, Processing, and PHP. Write programs to send data across the Internet based on physical activity in your home, office, or backyard And much more With a little electronics know-how, basic (not necessarily in BASIC) programming skills, a couple of inexpensive microcontroller kits and some network modules to make them communicate using Ethernet, ZigBee, and Bluetooth, you can get started on these projects right away. With Making Things Talk, the possibilities are practically endless.
Fuzzy Thinking: The New Science of Fuzzy Logic
Bart Kosko - 1993
An authoritative introduction to "fuzzy logic" brings readers up to speed on the "smart" products and computers that will change all of our lives in the future.
Architecture Patterns with Python: Enabling Test-Driven Development, Domain-Driven Design, and Event-Driven Microservices
Harry Percival - 2020
Many Python developers are now taking an interest in high-level software architecture patterns such as hexagonal/clean architecture, event-driven architecture, and strategic patterns prescribed by domain-driven design (DDD). But translating those patterns into Python isn't always straightforward.With this practical guide, Harry Percival and Bob Gregory from MADE.com introduce proven architectural design patterns to help Python developers manage application complexity. Each pattern is illustrated with concrete examples in idiomatic Python that explain how to avoid some of the unnecessary verbosity of Java and C# syntax. You'll learn how to implement each of these patterns in a Pythonic way.Architectural design patterns include:Dependency inversion, and its links to ports and adapters (hexagonal/clean architecture)Domain-driven design's distinction between entities, value objects, and aggregatesRepository and Unit of Work patterns for persistent storageEvents, commands, and the message busCommand Query Responsibility Segregation (CQRS)Event-driven architecture and reactive microservices
Handbook of Applied Cryptography
Alfred J. Menezes - 1996
Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Combinatorial Optimization: Algorithms and Complexity
Christos H. Papadimitriou - 1998
All chapters are supplemented by thought-provoking problems. A useful work for graduate-level students with backgrounds in computer science, operations research, and electrical engineering. "Mathematicians wishing a self-contained introduction need look no further." — American Mathematical Monthly.
The Cartoon Guide to Statistics
Larry Gonick - 1993
Never again will you order the Poisson Distribution in a French restaurant!This updated version features all new material.
SSH, The Secure Shell: The Definitive Guide
Daniel J. Barrett - 2001
It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.