Fundamentals of Computer Algorithms


Ellis Horowitz - 1978
    The book comprises chapters on elementary data structures, dynamic programming, backtracking, algebraic problems, lower bound theory, pram algorithms, mesh algorithms, and hypercube algorithms. In addition, the book consists of several real-world examples to understand the concepts better. This book is indispensable for computer engineers preparing for competitive examinations like GATE and IES.

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Nicola's Virtue


AnneMarie Brear - 2013
    With no family, but a good education, she boards a ship to Australia with high hopes of a fresh start in a new country as a governess. But Sydney is full of young women with similar hopes and equally poor prospects. When Nicola is at her lowest ebb, a benefactor appears, Mr Belfroy, whose past has made him sympathetic to women struggling to survive. She also meets Frances West, an activist from a privileged background, and her attractive but distant brother, Nathaniel. However hard she tries to resist, Nicola's attraction to Nathaniel West grows. Her achievements at the Governess Home are vital to her. Can she have both?

Cryptanalysis: A Study of Ciphers and Their Solution


Helen Fouche Gaines - 1939
    Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.

Programming in Haskell


Graham Hutton - 2006
    This introduction is ideal for beginners: it requires no previous programming experience and all concepts are explained from first principles via carefully chosen examples. Each chapter includes exercises that range from the straightforward to extended projects, plus suggestions for further reading on more advanced topics. The author is a leading Haskell researcher and instructor, well-known for his teaching skills. The presentation is clear and simple, and benefits from having been refined and class-tested over several years. The result is a text that can be used with courses, or for self-learning. Features include freely accessible Powerpoint slides for each chapter, solutions to exercises and examination questions (with solutions) available to instructors, and a downloadable code that's fully compliant with the latest Haskell release.

Handbook of Applied Cryptography


Alfred J. Menezes - 1996
    Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

In Black and White


Jake White - 2007
    The first man to coach the Springboks for four successive seasons, his rise to the top job in SA rugby is a journey of intense determination to succeed against all odds.

Computer Organization


V. Carl Hamacher - 1978
    *A comprehensive overview of hardware and software issues make this a "must-have" for electrical and computer engineers*Contains new material on RISC processors, performance analysis, multiprocessors and memory systems*New two-color design and illustrations illuminate the text

The Dressmaker's Son


Abbi Sherman Schaefer - 2013
    Rachael's family comes to America to start a new life after fleeing the pogroms in Russia. Rebekah comes to America with her son, Samuel, fleeing his father, Misha, a Russian soldier with whom she had an affair and has threatened to take him away from her so he will not grow up as a Jew and the son of a cobbler. Set in the Lower East Side of New York and pre-revolutionary St. Petersburg, Russia, both women adjust to life in America until Misha kidnaps Samuel and returns with him to Russia. How Rebekah rises to the challenge of earning enough money as a designer of women's gowns to return to St. Petersburg to find her son, and the difficulties she encounters while there, including murder and prison, show the reader the full extent of a mother's ingenuity and determination when it comes to her child. Rachael also faces the possibility of losing a child to war when her son Solomon enlists in the army as America's entry into World War I approaches.

Bring the Joy


Jessica Janzen - 2020
    From the bliss of her dramatic, romantic saga with her now husband, to the trials and triumph of her career journey as a young women, to the devastating loss of her son when he was only six months old, Jessica's commitment to follow the nudges of her heart have seen her through every season. Through her hilarious, inspiring stories and refreshing honesty, Jessica will challenge you start looking for ways to brings more joy to your life and the lives of those around you. Life lived to the fullest can only happen when you bring the joy.

Mr and Mrs Sullivan: Standalone Arranged Marriage Romance


Simone Nicholls - 2020
    

Engineering Thermodynamics: A Computer Approach (Si Units Version) (Revised)


R.K. Rajput - 2009
    Pure Substances, The First And Second Laws, Gases, Psychrometrics, The Vapor, Gas And Refrigeration Cycles, Heat Transfer, Compressible Flow, Chemical Reactions, Fuels, And More Are Presented In Detail And Enhanced With Practical Applications. This Version Presents The Material Using SI Units And Has Ample Material On SI Conversion, Steam Tables, And A Mollier Diagram. A CD-ROM, Included With The Print Version Of The Text, Includes A Fully Functional Version Of Quickfield (Widely Used In Industry), As Well As Numerous Demonstrations And Simulations With MATLAB, And Other Third Party Software.

Stealing Sweetwater


Matthew Iden - 2014
    Lee Baylor runs a failing garage in a dying southern Virginia town and when old friend—but present-day con—Randy Watson shows up with a plan to make some quick cash, Lee’s got to take it.Randy’s idea? Steal a one-of-a-kind, vintage Harley from millionaire movie star Jason Ford, who likes to act the hotshot biker at the annual Sweetwater motorcycle rally with his knockout starlet girlfriend Becky Winters.The only hitch is that Jason’s got money problems of his own, and when hillbilly gangster Baby Boy gets involved, there’s going to be hell to pay when they all try Stealing Sweetwater.Previously published under a different title.

Bigfoot Terror in the Woods: Sightings and Encounters, Volume 6


W.J. Sheehan - 2018
    as they pertain to Bigfoot in North America. Some of these accounts may be quite terrifying...Reader discretion is advised

Dangerous Ascent (Book 1): Starfall (An Unofficial Minecraft Book for Kids Ages 9 - 12 (Preteen)


Mark Mulle - 2017
    His people are strong and brave, and he has a great desire: To become the greatest warrior that ever lives. His big day has arrived — the day of the Coming of Age Tournament. A great comet shines over the Minecraft World, and he knows that his fate is to succeed. However…the comet is not a good omen at all…It is the herald of doom. A terrible explosion lights up above him and his village and they all realize: the giant flaming rock carries something much more dangerous inside. A Demon King from another world, and his thousands-strong army. The Minecraft World is about to face its biggest ever threat. The tale of Dangerous Ascent is one of heroism, battle, darkness and fear as Lucas begins his quest to save the world and become the greatest ever warrior. The Demon King is a powerful and cruel being, and he has claimed the Minecraft World with his seemingly unstoppable might. Can the races of Minecraft unite and fight this enemy, or will they lose everything? The great battle is about to begin. This unofficial Minecraft book is not authorized, endorsed or sponsored by Microsoft Corp., Mojang AB, Notch Development AB or any other person or entity owning or controlling the rights of the Minecraft name, trademark or copyrights. All characters, names, places and other aspects of the game described herein are trademarked and owned by their respective owners. Minecraft®/ /TM & ©2009-2016 Mojang/Notch.