Probabilistic Robotics


Sebastian Thrun - 2005
    Building on the field of mathematical statistics, probabilistic robotics endows robots with a new level of robustness in real-world situations. This book introduces the reader to a wealth of techniques and algorithms in the field. All algorithms are based on a single overarching mathematical foundation. Each chapter provides example implementations in pseudo code, detailed mathematical derivations, discussions from a practitioner's perspective, and extensive lists of exercises and class projects. The book's Web site, www.probabilistic-robotics.org, has additional material. The book is relevant for anyone involved in robotic software development and scientific research. It will also be of interest to applied statisticians and engineers dealing with real-world sensor data.

CISSP All-in-One Exam Guide


Shon Harris - 2001
    Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.

Introduction to Computer Theory


Daniel I.A. Cohen - 1986
    Covers all the topics needed by computer scientists with a sometimes humorous approach that reviewers found refreshing. The goal of the book is to provide a firm understanding of the principles and the big picture of where computer theory fits into the field.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Scars and Voices: And Other Stories


Adam Carpenter Welles - 2019
    In this collection of his stories (each of which has a story behind it), you'll read about two retired spiritual leaders who experience a miracle in their nursing home, a gay relationship that must end between an American man and a Thai student, the astonishing adventures of an early mid-life failure, the thrilling chase one gay man undertakes for another intriguing, confusing, mysterious man, and a mind-blowing time-travel misadventure involving a man and a dog, as well as a few other surprises. This genre bending collection will captivate you. You might even enjoy the stories. Adam Carpenter Welles works in media in a major city in the Southeastern United States.

A Microsoft Life


Stephen Toulouse - 2010
    Enjoy a journey through the eyes of a geek working at one of the most important companies in the world as he walks you through events both large and small. Just don't get caught in the Redmond reality distortion field! What others are saying about "A Microsoft Life": "Any self-respecting geek needs to read this book. Stepto provides an enjoyable and entertaining insight of life inside Microsoft." - Larry "Major Nelson" Hryb, Director of Programming for Xbox LIVE "Anyone who lived through the adolescent years of the computer revolution will alternate between laughing and crying (from laughing) at these great stories from inside the monolith. - Ken Denmead, NYT Bestselling Author, and editor of Geekdad.com

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Python for Finance: Analyze Big Financial Data


Yves Hilpisch - 2012
    This hands-on guide helps both developers and quantitative analysts get started with Python, and guides you through the most important aspects of using Python for quantitative finance.Using practical examples through the book, author Yves Hilpisch also shows you how to develop a full-fledged framework for Monte Carlo simulation-based derivatives and risk analytics, based on a large, realistic case study. Much of the book uses interactive IPython Notebooks, with topics that include:Fundamentals: Python data structures, NumPy array handling, time series analysis with pandas, visualization with matplotlib, high performance I/O operations with PyTables, date/time information handling, and selected best practicesFinancial topics: mathematical techniques with NumPy, SciPy and SymPy such as regression and optimization; stochastics for Monte Carlo simulation, Value-at-Risk, and Credit-Value-at-Risk calculations; statistics for normality tests, mean-variance portfolio optimization, principal component analysis (PCA), and Bayesian regressionSpecial topics: performance Python for financial algorithms, such as vectorization and parallelization, integrating Python with Excel, and building financial applications based on Web technologies

Frieda And Min


Pamela Jooste - 2000
    She was a silent, unhappy girl, dumped on Frieda's exuberant family in Johannesburg for the summer of 1964 so that her mother could go off with her new husband. In a way, Min and Frieda were both outsiders - Min, raised in the bush by her idealistic doctor father, and Frieda, daughter of a poor Jewish saxophone player who lived almost on top of a native neighborhood. The two girls, thrown together - the 'white kaffir' and the poor Jewish girl - formed a strange but loyal friendship, a friendship that was to last even through the terrible years of oppression and betrayal during the time of South Africa under Apartheid.

Digital Signal Processing: Principles, Algorithms, and Applications


John G. Proakis - 1992
    This book presents the fundamentals of discrete-time signals, systems, and modern digital processing and applications for students in electrical engineering, computer engineering, and computer science.The book is suitable for either a one-semester or a two-semester undergraduate level course in discrete systems and digital signal processing. It is also intended for use in a one-semester first-year graduate-level course in digital signal processing.

Microsoft Excel 2013 Power Programming with VBA


John Walkenbach - 2013
    Naturally, that means John Walkenbach returns with a new edition of his bestselling VBA Programming book and covers all the methods and tools you need to know in order to program with Excel. With this comprehensive guide, Mr. Spreadsheet shows you how to maximize your Excel experience using professional spreadsheet application development tips from his own personal bookshelf.Featuring a complete introduction to Visual Basic for Applications and fully updated for the latest features of Excel 2013, this essential reference includes an analysis of Excel application development and is packed with procedures, tips, and ideas for expanding Excel's capabilities with VBA.Offers an analysis of Excel application development and a complete introduction to VBA Features invaluable advice from Mr. Spreadsheet himself, bestselling author John Walkenbach, who demonstrates all the techniques you need to create Excel applications, both large and small Covers navigating the Excel interface, formatting worksheets, interacting with other Office applications, working with collaboration tools, and using sample workbooks and John Walkenbach's award-winning Power Utility Pak to help enhance your Excel skills Provides tips, tricks, and techniques for expanding Excel's capabilities with VBA that you wont find anywhere else Excel 2013 Power Programming with VBA is packed with procedures, tips, and ideas for achieving Excel excellence with VBA.

Bayesian Reasoning and Machine Learning


David Barber - 2012
    They are established tools in a wide range of industrial applications, including search engines, DNA sequencing, stock market analysis, and robot locomotion, and their use is spreading rapidly. People who know the methods have their choice of rewarding jobs. This hands-on text opens these opportunities to computer science students with modest mathematical backgrounds. It is designed for final-year undergraduates and master's students with limited background in linear algebra and calculus. Comprehensive and coherent, it develops everything from basic reasoning to advanced techniques within the framework of graphical models. Students learn more than a menu of techniques, they develop analytical and problem-solving skills that equip them for the real world. Numerous examples and exercises, both computer based and theoretical, are included in every chapter. Resources for students and instructors, including a MATLAB toolbox, are available online.

The School for Good and Evil Book Series Books 1 - 5 Collection Set by Soman Chainani (School for Good and Evil, World Without Princes, Last Ever After, Quests for Glory & Crystal of Time)


Soman Chainani - 2020
    

Yoga Vasishta Sara


Vālmīki - 1973
    It is a dialogue between Sage Vasishta and Sri Rama, during which Advaita (the doctrine of non-duality) in its pure form of ajatavada (theory of non-origination) is expounded, with illustrative stories in between. This vast work was abridged some centuries ago by Abhinanda Pandita, a Kashmiri scholar, into 6,000 couplets, which go by the name of Laghu Yoga Vasishta. This is a masterpiece in itself, like the original Brihat.Bhagavan Sri Ramana Maharshi used to refer to Yoga Vasishta frequently and has even incorporated six couplets from it in His Supplement to Forty Verses (verses 21 to 27).A further condensation of this work was made long ago, by an unknown author, into about 230 couplets, divided into ten chapters, as Yoga Vasishta Sara (Essence of Yoga Vasishta). By making this condensation the author has rendered a great service to all sadhaks. This is indeed a goldmine fit for repeated reading and meditation.

Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking)


Andrew McKinnon - 2015
    It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Denial of Service or DoS Spoofing Techniques Mobile Hacking Hacking Tools Penetration Testing Passive Attacks If you are looking to venture into the world of hacking, this book will teach you all the information you need to know. When you download Hacking: Ultimate Hacking For Beginners - How to Hack, you'll discover how to acquire Many Powerful Hacking Tools. You'll also learn about Malware: A Hacker’s Henchman and Common Attacks And Viruses. You'll even learn about identity theft, how to protect yourself, and how hackers profit from this information! Read this book for FREE on Kindle Unlimited - Download NOW! Download Hacking: Ultimate Hacking For Beginners - How to Hack right away - This Amazing 4th Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, mobile hacking, and tips for ethical hacking. You'll even learn how to fight viruses and choose the right antivirus software for your system! Just scroll to the top of the page and select the Buy Button. Download Your Copy TODAY!