The Game Maker's Apprentice: Game Development for Beginners


Jacob Habgood - 2006
    This book covers a range of genres, including action, adventure, and puzzle games complete with professional quality sound effects and visuals. It discusses game design theory and features practical examples of how this can be applied to making games that are more fun to play. Game Maker allows games to be created using a simple drag-and-drop interface, so you don't need to have any prior coding experience. It includes an optional programming language for adding advanced features to your games, when you feel ready to do so. You can obtain more information by visiting book.gamemaker.nl. The authors include the creator of the Game Maker tool and a former professional game programmer, so you'll glean understanding from their expertise. The book also includes a DVD containing Game Maker software and all of the game projects that are created in the book—plus a host of professional-quality graphics and sound effects that you can use in your own games.

Starting Out with Java: From Control Structures Through Objects


Tony Gaddis - 2009
    If you wouldlike to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0132989999/ISBN-13: 9780132989992. That packageincludes ISBN-10: 0132855836/ISBN-13: 9780132855839 and ISBN-10: 0132891557/ISBN-13: 9780132891554. MyProgrammingLab should only be purchased when required by an instructor. In "Starting Out with Java: From Control Structures through Objects", Gaddis covers procedural programming control structures and methods before introducing object-oriented programming. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, and an abundance of exercises appear in every chapter. "

Java SE 6: The Complete Reference


Herbert Schildt - 2006
    He includes information on Java Platform Standard Edition 6 (Java SE 6) and offers complete coverage of the Java language, its syntax, keywords, and fundamental programming principles.

Discrete-Event System Simulation


Jerry Banks - 1983
    This text provides a basic treatment of discrete-event simulation, including the proper collection and analysis of data, the use of analytic techniques, verification and validation of models, and designing simulation experiments. It offers an up-to-date treatment of simulation of manufacturing and material handling systems, computer systems, and computer networks. Students and instructors will find a variety of resources at the associated website, www.bcnn.net, including simulation source code for download, additional exercises and solutions, web links and errata.

Calculus: Early Transcendental Functions


Ron Larson - 1900
    Two primary objectives guided the authors in the revision of this book: to develop precise, readable materials for students that clearly define and demonstrate concepts and rules of calculus; and to design comprehensive teaching resources for instructors that employ proven pedagogical techniques and save time. The Larson/Hostetler/Edwards Calculus program offers a solution to address the needs of any calculus course and any level of calculus student. Every edition from the first to the fourth of Calculus: Early Transcendental Functions, 4/e has made the mastery of traditional calculus skills a priority, while embracing the best features of new technology and, when appropriate, calculus reform ideas. Now, the Fourth Edition is part of the first calculus program to offer algorithmic homework and testing created in Maple so that answers can be evaluated with complete mathematical accuracy.

Gödel, Escher, Bach: An Eternal Golden Braid


Douglas R. Hofstadter - 1979
    However, according to Hofstadter, the formal system that underlies all mental activity transcends the system that supports it. If life can grow out of the formal chemical substrate of the cell, if consciousness can emerge out of a formal system of firing neurons, then so too will computers attain human intelligence. Gödel, Escher, Bach is a wonderful exploration of fascinating ideas at the heart of cognitive science: meaning, reduction, recursion, and much more.

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Dr. Pestana's Surgery Notes: Top 180 Vignettes for the Surgical Wards


Carlos Pestana - 2013
    But time in the wards is limited, and clerkship covers only a tiny sample of the surgical universe. Dr. Pestana's Surgery Notes, by distinguished surgery instructor Dr. Carlos Pestana, is a proven guide to ensure your surgical knowledge. With a concise, comprehensive review and 180 high-yield surgical vignettes for self-testing, it contains the surgery knowledge you need to excel on the Surgery shelf exam and USMLE Step 2 CK.Features:— Concise high-yield review of core surgery material— 180 vignettes for self-testing— Used by med students for over a decade— Fully up-to-date— Pocket-sized to carry with you in the wards

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

Essential Environment: The Science Behind the Stories


Jay Withgott - 2011
    Jay Withgott and new co-author Matt Laposata present the latest coverage of environmental science and introduce new FAQ sections to address common student misconceptions. Note: This is the standalone book if you want the book/access card order the ISBN below: 0321752546 / 9780321752543 Essential Environment: The Science behind the Stories Plus MasteringEnvironmentalScience with eText -- Access Card Package Package consists of: 0321752902 / 9780321752901 Essential Environment: The Science behind the Stories 0321754077 / 9780321754073 MasteringEnvironmentalScience with Pearson eText -- Valuepack Access Card -- Essential Environment: The Science behind the Stories (ME component) "

The Smart Words and Wicked Wit of Winston Churchill


Max Morris - 2017
    “It does not seem to be much use being anything else.”Have you ever wanted to deliver the ultimate Churchillian wisecrack? Give sound advice to a peer on how to deal with life’s problems? Or contribute to a heated discussion on international politics? The Smart Words and Wicked Wit of Winston Churchill is the perfect pocket book to carry around in your arsenal as you laugh at Churchill’s devious brand of smarts and learn from his political and humanist outlook on life during the turmoil of the Second World War. Discover what he had to say about domestic politics, war and peace, power, struggles and strife, education, philosophy, and some of the biggest names of his time, including himself.Beautifully designed and curated, this entertaining collection compiles the wisest and wittiest Churchill quotations that speak of the politician’s enduring legacy in contemporary pop culture. Full of savvy and wisdoms, The Smart Words and Wicked Wit of Winston Churchill is sure to delight devoted fans of history and casual readers alike.

Building Java Programs: A Back to Basics Approach


Stuart Reges - 2007
    By using objects early to solve interesting problems and defining objects later in the course, Building Java Programs develops programming knowledge for a broad audience. Introduction to Java Programming, Primitive Data and Definite Loops, Introduction to Parameters and Objects, Conditional Execution, Program Logic and Indefinite Loops, File Processing, Arrays, Defining Classes, Inheritance and Interfaces, ArrayLists, Java Collections Framework, Recursion, Searching and Sorting, Graphical User Interfaces. For all readers interested in introductory programming.

Hal Leonard Bass Method - Complete Edition


Ed Friedland - 1996
    Bass MethodThe critically acclaimed Hal Leonard Electric Bass Method Second Edition in a handy composite edition Contains 3 books and 3 CDs for Levels 1, 2 and 3.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Applications of No-Limit Hold ’em: A Guide to Understanding Theoretically Sound Poker


Matthew Janda - 2013
    This task would be impossible if a player had to actually think about every other hand in his range, but by understanding theoretical sound poker, he can quickly design balanced ranges using the proper bet-sizing while playing. Applications of No-Limit Hold 'em teaches theoretical sound poker, and thus the ability to create the bet-sizings and ranges which will beat the better players. The theory in this book is not designed to be complex or abstract, but rather it's intended to be applied immediately producing better overall results.Many confusing concepts such as overbetting, balancing multiple bet-sizing ranges, donk betting, and check-raising as the preflop raiser are crucial to a player's strategy despite few players implementing them or talking