Book picks similar to
More Cocoa Programming for OS X: The Big Nerd Ranch Guide by Aaron Hillegass
swift
books-wantex
computers
inventions
Textbook of Pathology
Harsh Mohan - 2005
- Book Review Editor of the journal "Modern Pathology," the official journal of the United States-Canadian Academy of Pathology and prestigious best-selling author. This is the 5th edition of a book that has already established itself as the classic pathology textbook in India. This new edition has been updated, and improved to meet the highest standards of quality and information now required by pathology courses around the world. Editorially this new edition carries particular emphasis on molecular pathology and genetics in the pathogenesis of various diseases, and the pathological discussions of each organ or system is preceded with a short description of its structure and function. The material is integrated with extensive page cross references between chapters and the whole book has been thoroughly re-edited, with new images, illustrations and line drawings. The book is accompanied by the free student revision aid "Pathology - Quick Review and MCQs" and therefore, together as a package, "Textbook of Pathology, 5E" will be a major contribution to the required reading of undergraduate medical students worldwide.
SSH, The Secure Shell: The Definitive Guide
Daniel J. Barrett - 2001
It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.
The Swift Programming Language
Apple Inc. - 2014
Swift builds on the best of C and Objective-C, without the constraints of C compatibility. Swift adopts safe programming patterns and adds modern features to make programming easier, more flexible, and more fun. Swift’s clean slate, backed by the mature and much-loved Cocoa and Cocoa Touch frameworks, is an opportunity to reimagine how software development works.
Stealing the Network: How to Own a Continent
Ryan Russell - 2004
While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world
The Fourth Transformation: How Augmented Reality and Artificial Intelligence Change Everything
Robert Scoble - 2016
Python Algorithms: Mastering Basic Algorithms in the Python Language
Magnus Lie Hetland - 2010
Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques.The book deals with some of the most important and challenging areas of programming and computer science, but in a highly pedagogic and readable manner. The book covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others himself.
The Guitar Amp Handbook: Understanding Tube Amplifiers and Getting Great Sounds
Dave Hunter - 2005
For years, experts have argued over the tiny details of exactly how they do what they do, and how their various components interact. What's undeniable is that, far more than being just a loudness booster the unique combination of tubes, capacitors, resistors, and transformers in these amps can contribute enormously to the quality of sound derived from any electric guitar. In this thorough and authoritative book, Dave Hunter cuts through the marketing hyperbole, and the blind faith, and supplies all the information you need to choose the right amp, and get the best from it. The book also features exclusively conducted, in-depth interviews with leading figures in the tube amp-building world - including Ken Fischer, Mark Sampson, and Michael Zaite - and even provides full instructions on how to construct your own high-quality tube guitar amp from scratch.
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Lee Holmes - 2007
Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Programming in Python 3: A Complete Introduction to the Python Language
Mark Summerfield - 2008
It brings together all the knowledge needed to write any program, use any standard or third-party Python 3 library, and create new library modules of your own.
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
The Quick Python Book
Naomi R. Ceder - 2000
This updated edition includes all the changes in Python 3, itself a significant shift from earlier versions of Python.The book begins with basic but useful programs that teach the core features of syntax, control flow, and data structures. It then moves to larger applications involving code management, object-oriented programming, web development, and converting code from earlier versions of Python.True to his audience of experienced developers, the author covers common programming language features concisely, while giving more detail to those features unique to Python.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
Unauthorised Access: Physical Penetration Testing for IT Security Teams
Wil Allsopp - 2009
IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
Microsoft Excel Essential Hints and Tips: Fundamental hints and tips to kick start your Excel skills
Diane Griffiths - 2015
We look at how to set up your spreadsheet, getting data into Excel, formatting your spreadsheet, a bit of display management and how to print and share your spreadsheets. Learn Excel Visually The idea of these short handy bite-size books is to provide you with what I have found to be most useful elements of Excel within my day-to-day work and life. I don’t tell you about all the bells and whistles – just what you need on a daily basis. These eBooks are suitable for anyone who is looking to learn Excel and wants to increase their productivity and efficiency, both at work and home. Please bear in mind I don’t cover all functionality of all areas, the point is that I strip out anything that’s not useful and only highlight the functionality that I believe is useful on a daily basis. Don’t buy a huge textbook which you’ll never fully read, pick an eBook which is most relevant to your current learning, read it, apply it and then get on with your day.
Tcp/IP Illustrated, Volume 3: TCP for Transactions, Http, Nntp, and the Unix Domain Protocols
W. Richard Stevens - 1996
As in the previous two volumes, the book is filled with examples and implementation details within the 4.4BSD-Lite networking code. The TCP/IP Illustrated series provides a complete picture of the protocol suite that drives the Internet, and gives programmers, system administrators, and serious users the information, understanding, and skills they need to remain at the forefront of networking technology.