A Brief Tour of Human Consciousness: From Impostor Poodles to Purple Numbers


V.S. Ramachandran - 2003
    Ramachandran, now shares his unique insight into human consciousness in an entertaining, inspiring, and intellectually dazzling brief tour of the ultimate frontier—the thoughts in our heads.A Brief Tour of Human Consciousness is made up of five investigations of the greatest mysteries of the brain. The first chapter shows how amputees feel pain in limbs they no longer have as it introduces the great revolution of our age: neuroscience. The second chapter walks through the way what we see determines our thoughts, and demonstrates the counterintuitive point that believing is in fact seeing. The third chapter takes a leap beyond cutting edge science to audaciously set out a general theory of beauty, explaining why, the world over, cultures have fundamentally similar notions of what is attractive. The fourth chapter explores the bizarre world of synesthetes, people who see colors in numbers, textures in smells, sounds in sights, and flavors in sounds. Finally, V. S. Ramachandran one of the foremost brain researchers in the world today, sums up the implications of the revolution in our understanding of consciousness, to make a fascinating argument about our essential sense of self and its distributed nature.

Data Science at the Command Line: Facing the Future with Time-Tested Tools


Jeroen Janssens - 2014
    You'll learn how to combine small, yet powerful, command-line tools to quickly obtain, scrub, explore, and model your data.To get you started--whether you're on Windows, OS X, or Linux--author Jeroen Janssens introduces the Data Science Toolbox, an easy-to-install virtual environment packed with over 80 command-line tools.Discover why the command line is an agile, scalable, and extensible technology. Even if you're already comfortable processing data with, say, Python or R, you'll greatly improve your data science workflow by also leveraging the power of the command line.Obtain data from websites, APIs, databases, and spreadsheetsPerform scrub operations on plain text, CSV, HTML/XML, and JSONExplore data, compute descriptive statistics, and create visualizationsManage your data science workflow using DrakeCreate reusable tools from one-liners and existing Python or R codeParallelize and distribute data-intensive pipelines using GNU ParallelModel data with dimensionality reduction, clustering, regression, and classification algorithms

Information Theory: A Tutorial Introduction


James V. Stone - 2015
    In this richly illustrated book, accessible examples are used to show how information theory can be understood in terms of everyday games like '20 Questions', and the simple MatLab programs provided give hands-on experience of information theory in action. Written in a tutorial style, with a comprehensive glossary, this text represents an ideal primer for novices who wish to become familiar with the basic principles of information theory.Download chapter 1 from http://jim-stone.staff.shef.ac.uk/Boo...

Introduction to Graph Theory


Douglas B. West - 1995
    Verification that algorithms work is emphasized more than their complexity. An effective use of examples, and huge number of interesting exercises, demonstrate the topics of trees and distance, matchings and factors, connectivity and paths, graph coloring, edges and cycles, and planar graphs. For those who need to learn to make coherent arguments in the fields of mathematics and computer science.

Professor Maxwell’s Duplicitous Demon: The Life and Science of James Clerk Maxwell


Brian Clegg - 2019
    But ask a physicist and there’s no doubt that James Clerk Maxwell will be near the top of the list.  Maxwell, an unassuming Victorian Scotsman, explained how we perceive colour. He uncovered the way gases behave. And, most significantly, he transformed the way physics was undertaken in his explanation of the interaction of electricity and magnetism, revealing the nature of light and laying the groundwork for everything from Einstein’s special relativity to modern electronics.   Along the way, he set up one of the most enduring challenges in physics, one that has taxed the best minds ever since. ‘Maxwell’s demon’ is a tiny but thoroughly disruptive thought experiment that suggests the second law of thermodynamics, the law that governs the flow of time itself, can be broken. This is the story of a groundbreaking scientist, a great contributor to our understanding of the way the world works, and his duplicitous demon.

The Intelligent Web: Search, Smart Algorithms, and Big Data


Gautam Shroff - 2013
    These days, linger over a Web page selling lamps, and they will turn up at the advertising margins as you move around the Internet, reminding you, tempting you to make that purchase. Search engines such as Google can now look deep into the data on the Web to pull out instances of the words you are looking for. And there are pages that collect and assess information to give you a snapshot of changing political opinion. These are just basic examples of the growth of Web intelligence, as increasingly sophisticated algorithms operate on the vast and growing amount of data on the Web, sifting, selecting, comparing, aggregating, correcting; following simple but powerful rules to decide what matters. While original optimism for Artificial Intelligence declined, this new kind of machine intelligence is emerging as the Web grows ever larger and more interconnected.Gautam Shroff takes us on a journey through the computer science of search, natural language, text mining, machine learning, swarm computing, and semantic reasoning, from Watson to self-driving cars. This machine intelligence may even mimic at a basic level what happens in the brain.

Prescott, Harley, Klein's Microbiology


Joanne Willey - 2007
    Because of this balance, the Seventh Edition of Microbiology is appropriate for microbiology majors and mixed majors courses. The new authors have focused on readability, artwork, and the integration of several key themes (including evolution, ecology and diversity) throughout the text, making an already superior text even better.

Programming Arduino Getting Started with Sketches


Simon Monk - 2011
    No prior programming experience is required! The downloadable sample programs featured in the book can be used as-is or modified to suit your purposes. Understand Arduino hardware fundamentals Install the software, power it up, and upload your first sketch Learn C language basics Write functions in Arduino sketches Structure data using arrays and strings Use Arduino's digital and analog inputs and outputs in your programs Work with the Standard Arduino Library Write sketches that can store data Program LCD displays Use an Ethernet shield to enable Arduino to function as a web server Write your own Arduino librariesIn December 2011, Arduino 1.0 was released. This changed a few things that have caused two of the sketches in this book to break. The change that has caused trouble is that the classes 'Server' and 'Client' have been renamed to 'EthernetServer' and 'EthernetClient' respectively. To fix this: Edit sketches 10-01 and 10-02 to replace all occurrences of the word 'Server' with 'EthernetServer' and all occurrences of 'Client' with 'EthernetClient'. Alternatively, you can download the modified sketches for 10-01 and 10-02 from here: http: //www.arduinobook.com/arduino-1-0Make Great Stuff! TAB, an imprint of McGraw-Hill Professional, is a leading publisher of DIY technology books for makers, hackers, and electronics hobbyists.

Intermediate Perl


Randal L. Schwartz - 2003
    One slogan of Perl is that it makes easy things easy and hard things possible. "Intermediate Perl" is about making the leap from the easy things to the hard ones.Originally released in 2003 as "Learning Perl Objects, References, and Modules" and revised and updated for Perl 5.8, this book offers a gentle but thorough introduction to intermediate programming in Perl. Written by the authors of the best-selling "Learning Perl," it picks up where that book left off. Topics include: Packages and namespacesReferences and scopingManipulating complex data structuresObject-oriented programmingWriting and using modulesTesting Perl codeContributing to CPANFollowing the successful format of "Learning Perl," we designed each chapter in the book to be small enough to be read in just an hour or two, ending with a series of exercises to help you practice what you've learned. To use the book, you just need to be familiar with the material in "Learning Perl" and have ambition to go further.Perl is a different language to different people. It is a quick scripting tool for some, and a fully-featured object-oriented language for others. It is used for everything from performing quick global replacements on text files, to crunching huge, complex sets of scientific data that take weeks to process. Perl is what you make of it. But regardless of what you use Perl for, this book helps you do it more effectively, efficiently, and elegantly."Intermediate Perl" is about learning to use Perl as a programming language, and not just a scripting language. This is the book that turns the Perl dabbler into the Perl programmer.

Fundamentals of Logic Design


Charles H. Roth Jr. - 1975
    Author Charles H. Roth, Jr. carefully presents the theory that is necessary for understanding the fundamental concepts of logic design while not overwhelming students with the mathematics of switching theory. Divided into 20 easy-to-grasp study units, the book covers such fundamental concepts as Boolean algebra, logic gates design, flip-flops, and state machines. By combining flip-flops with networks of logic gates, students will learn to design counters, adders, sequence detectors, and simple digital systems. After covering the basics, this text presents modern design techniques using programmable logic devices and the VHDL hardware description language.

Building Java Programs: A Back to Basics Approach


Stuart Reges - 2007
    By using objects early to solve interesting problems and defining objects later in the course, Building Java Programs develops programming knowledge for a broad audience. Introduction to Java Programming, Primitive Data and Definite Loops, Introduction to Parameters and Objects, Conditional Execution, Program Logic and Indefinite Loops, File Processing, Arrays, Defining Classes, Inheritance and Interfaces, ArrayLists, Java Collections Framework, Recursion, Searching and Sorting, Graphical User Interfaces. For all readers interested in introductory programming.

Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.

Principles of Neural Science


Eric R. Kandel - 1981
    It discusses neuroanatomy, cell and molecular mechanisms and signaling through a cognitive approach to behaviour. It features an expanded treatment of the nervous system, neurological and psychiatric diseases and perception.

Psychology of Learning for Instruction


Marcy P. Driscoll - 1993
    Psychology of Learning for Instruction, Third Edition, focuses on the applications and implications of the learning theories. Using excellent examples ranging from primary school instruction to corporate training, this text combines the latest thinking and research to give readers the opportunity to explore the individual theories as viewed by the experts. Readers are encouraged to apply "reflective practice," which is designed to foster a critical and reflective mode of thinking when considering any particular approach to learning and instruction. Provides readers with the practical knowledge needed to apply learning theories to instruction. KEY TOPICS: This text addresses learning as it relates to behavior, cognition, development, biology, motivation and instruction. MARKET: Pre-service and in-service teachers, and educational psychologists.

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.