Getting Started with Arduino


Massimo Banzi - 2008
    Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.

Gas! The Battle for Ypres, 1915


James L. McWilliams - 1985
    Perfect for readers of Max Hastings, Martin Middlebrook and Tim Cook. By 1915, the Western Front had descended into deadlock. Near the town of Ypres, soldiers from Canada, Britain, India, France, Belgium, the French Colonies and Germany sat in long winding trenches facing each other. German commanders sought to break through the Allied lines by using a new weapon: chlorine gas. At five o’clock on 22nd April 1915, German troops opened the valves on their deadly steel cylinders and chemical warfare entered the First World War. As the thick, yellow-green cloud of smoke was carried by the wind into Allied trenches it overcame all those who breathed in its poisonous vapours. By the end of the Second Battle of Ypres, thousands of men had been killed and even more were injured as a result of gas. J. McWilliams and R. J. Steel uncover this horrifying battle from beginning to end and explore what it was like the for the French Algerians who first witnessed the gas clouds approaching them, how the Canadians stubbornly refused to retreat in the face of gas, what the British and Indians hoped to achieve with their tragic counterattacks, and ultimately why the German offensive failed. Gas! The Battle for Ypres, 1915 discusses the course of the battle, not just from the perspective of generals, but also drawing information from the accounts of field commanders and men who were there in the trenches witnessing these terrifying events first-hand.

Behold a Pale Horse


Milton William Cooper - 1991
    This information has been kept in topsecret government files since the 1940s. His audiences hear the truth unfold as he writes about the assassination of John F. Kennedy, the war on drugs, the secret government, and UFOs.Bill is a lucid, rational, and powerful speaker whose intent is to inform and to empower his audience. Standing room only is normal. His presentation and information transcend partisan affiliations as he clearly addresses issues in a way that has a striking impact on listeners of all backgrounds and interests. He has spoken to many groups throughout the United States and has appeared regularly on many radio talk shows and on television.In 1988 Bill decided to "talk" due to events then taking place worldwide, events that he had seen plans for back in the early 1970s. Bill correctly predicted the lowering of the Iron Curtain, the fall of the Berlin Wall, and the invasion of Panama. All Bill's predictions were on record well before the events occurred. Bill is not a psychic. His information comes from top secret documents that he read while with the Intelligence Briefing Team and from over seventeen years of research.

The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life Plus the Secrets of Enigma


Alan Turing - 2004
    In 1935, aged 22, he developed the mathematical theory upon which all subsequent stored-program digital computers are modeled.At the outbreak of hostilities with Germany in September 1939, he joined the Government Codebreaking team at Bletchley Park, Buckinghamshire and played a crucial role in deciphering Engima, the code used by the German armed forces to protect their radio communications. Turing's work on the versionof Enigma used by the German navy was vital to the battle for supremacy in the North Atlantic. He also contributed to the attack on the cyphers known as Fish, which were used by the German High Command for the encryption of signals during the latter part of the war. His contribution helped toshorten the war in Europe by an estimated two years.After the war, his theoretical work led to the development of Britain's first computers at the National Physical Laboratory and the Royal Society Computing Machine Laboratory at Manchester University.Turing was also a founding father of modern cognitive science, theorizing that the cortex at birth is an unorganized machine which through training becomes organized into a universal machine or something like it. He went on to develop the use of computers to model biological growth, launchingthe discipline now referred to as Artificial Life.The papers in this book are the key works for understanding Turing's phenomenal contribution across all these fields. The collection includes Turing's declassified wartime Treatise on the Enigma; letters from Turing to Churchill and to codebreakers; lectures, papers, and broadcasts which opened upthe concept of AI and its implications; and the paper which formed the genesis of the investigation of Artifical Life.

Tank: The Definitive Visual History of Armored Vehicles


David Willey - 2017
    Packed full of tanks, armored vehicles, personnel carriers, and anti-tank weaponry, "Tank" combines comprehensive photographic spreads with in-depth histories of key manufacturers and specially commissioned visual tours of the most iconic examples of their kind. The featured vehicles are placed in their wider context, along with with tactical and technological improvements, and the impact of the tank on the evolution of battlefield and military strategy."Tank" charts the evolution of the tank over the past century, covering over 450 tanks and military vehicles from all over the world. Look through the history of tanks and explore the form and function of a weapon that changed history. Learn the different vehicles' weight, size, country of origin, and time of use through in-depth profiles.An essential visual history, "Tank" provides a complete and exciting overview to the iconic vehicles that changed history.

Unity in Action


Joseph Hocking - 2015
    You'll master the Unity toolset from the ground up, adding the skills you need to go from application coder to game developer. Based on Unity version 5.About the BookThis book helps readers build successful games with the Unity game development platform. You will use the powerful C# language, Unity's intuitive workflow tools, and a state-of-the-art rendering engine to build and deploy mobile, desktop, and console games. Unity's single codebase approach minimizes inefficient switching among development tools and concentrates your attention on making great interactive experiences.Unity in Action teaches you how to write and deploy games. You'll master the Unity toolset from the ground up, adding the skills you need to go from application coder to game developer. Each sample project illuminates specific Unity features and game development strategies. As you read and practice, you'll build up a well-rounded skill set for creating graphically driven 2D and 3D game applications.You'll need to know how to program, in C# or a similar OO language. No previous Unity experience or game development knowledge is assumed.

The Food Lab: Better Home Cooking Through Science


J. Kenji López-Alt - 2015
    Kenji López-Alt has pondered all these questions and more. In The Food Lab, Kenji focuses on the science behind beloved American dishes, delving into the interactions between heat, energy, and molecules that create great food. Kenji shows that often, conventional methods don’t work that well, and home cooks can achieve far better results using new—but simple—techniques. In hundreds of easy-to-make recipes with over 1,000 full-color images, you will find out how to make foolproof Hollandaise sauce in just two minutes, how to transform one simple tomato sauce into a half dozen dishes, how to make the crispiest, creamiest potato casserole ever conceived, and much more.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

UNIX Shell Programming


Stephen G. Kochan - 1985
    A complete overview of shell programming This classic edition deals specifically with the techniques of shell programming.-- Presents information in step-by-step fashion-- Covers all the features of the standard shell, with additional instructions for the Korn Shell-- Teaches how to use the shell to tailor the UNIX environment

The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World


Pedro Domingos - 2015
    In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.

CompTIA Project+ Study Guide Authorized Courseware: Exam PK0–003


Kim Heldman - 2010
    You'll find complete coverage of all exam objectives, including key topics such as project planning, execution, delivery, closure, and others. CompTIA's Project+ is the foundation-level professional exam in the complex world of project management; certified project managers often choose to go on and obtain their Project Management Professional (PMP) certifications as well Provides complete coverage of all exam objectives for CompTIA's first update to the Project+ exam in six years Covers project planning, execution, delivery, change, control, communication, and closure Demonstrates and reinforces exam preparation with practical examples and real-word scenarios Includes a CD with Sybex test engine, practice exams, electronic flashcards, and a PDF of the book Approach the new Project+ exam with confidence with this in-depth study guide! Reviews

The New Marine Aquarium Step by Step Set Up and Stocking Guide


Michael S. Paletta - 1998
    By helping newcomers avoid the pitfalls of outdated, high-maintenance filtration techniques, the author offers an easy-to-follow route to long-term success with live rock, appropriate equipment, aquascaping, disease prevention, and essential husbandry techniques. Includes a photographic guide to selecting fishes, with dozens of hardy choices that are highly recommended for beginning hobbyists or others wanting beautiful, interesting, and long-lived marine species.

Professor Stewart's Hoard of Mathematical Treasures


Ian Stewart - 2009
    He mingles these with forays into ancient and modern mathematical thought, appallingly hilarious mathematical jokes, and enquiries into the great mathematical challenges of the present and past. Amongst a host of arcane and astonishing facts about every kind of number from irrational or imaginary to complex or cuneiform, we find out: how to organise chaos; how matter balances anti-matter; how to turn a sphere inside out (without creasing it...); why you can't comb a hairy ball; how to calculate pi by observing the stars. And we get some tantalising glimpses of the maths of life and the universe.Mind-stretching, enlightening and endlessly amusing, Professor Stewart's new entertainment will stimulate, delight, and enthral.

Programming Game AI by Example


Mat Buckland - 2004
    Techniques covered include state- and goal-based behavior, inter-agent communication, individual and group steering behaviors, team AI, graph theory, search, path planning and optimization, triggers, scripting, scripted finite state machines, perceptual modeling, goal evaluation, goal arbitration, and fuzzy logic.