Book picks similar to
Computer Organization and Architecture: Designing for Performance, 8/e by William Stallings
it-wikipedia
study
technical
cs
The Rough Guide to Portugal
John Fisher - 1984
The Rough Guide to Portugal guides you around the fashionable cities of Lisbon and Porto, takes you hiking in the hills of central and northern Portugal, and covers every beach along the Algarve, making it the ideal companion whether you're on a city break, beach holiday, or cross-country. The guide unearths the best sights, hotels, restaurants, and nightlife across every price range — from backpacker hostels to beachfront villas and boutique hotels. You'll find specialist coverage of Portuguese history, art, and literature and detailed information on the best markets and shopping for each region. The locally-based Rough Guide author team introduces the best vineyards, country taverns, and fado clubs and provides reliable insider tips, whether you're driving Portugal's roadways or shopping for linen and lace.Explore all corners of Portugal with authoritative background on everything from Porto's architecture to surfing at Peniche, and rely on handy language tips and the clearest maps of any guide. Make the most of your holiday with The Rough Guide to Portugal.
Head First Design Patterns
Eric Freeman - 2004
At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.
Ronan O'Gara: Unguarded: My Life in Rugby
Ronan O'Gara - 2013
Ronan O'Gara has been at the heart of Munster and Irish rugby for the past fifteen years. Now, as he comes to the end of a glittering playing career, it is time for him to reflect on those many successes and occasional failures with the straight-talking attitude that has become his trademark. Never one to shy away from the truth, the result is Ronan O'Gara: Unguarded. Packed full of anecdotes and analysis of the teammates O'Gara has been proud to share the shirt with, and of the coaches he has played under -- often in controversial circumstances -- this is the definitive record of an era when Munster rose to triumph in Europe, and Ireland to win the Grand Slam, before crashing down to earth again. It is simply the must-have rugby book of the year.
Manifesto: A Revolutionary Approach to General Aviation Maintenance
Mike Busch - 2014
Written in typical no-nonsense style, it lays out the basis of Mike's “minimalist” maintenance philosophy for owner-flown general aviation aircraft. An owner who follows the book's guidance can save a small fortune on maintenance costs and end up with a safer, more reliable aircraft.Owners are advised to perform the absolute least amount of maintenance required to make their aircraft safe, reliable and legal… and nothing more. The book explains in detail why engine and propeller TBOs and most other manufacturer-prescribed maintenance intervals should be disregarded. And “Manifesto” explains exactly how to do it.About the Author:Mike Busch is arguably the best-known A&P/IA in general aviation. In 2008, he was honored by the FAA as “National Aviation Maintenance Technician of the Year.” Mike has been a prolific aviation writer for more than four decades. His “Savvy Aviator” columns have appeared in numerous publications including EAA Sport Aviation, AOPA’s Opinion Leader’s Blog, AVweb, and magazines for the three largest GA type clubs (ABS, CPA, and COPA). He is renowned for his free monthly maintenance webinars and his standing-room-only forums at EAA AirVenture Oshkosh. Mike has been a pilot and aircraft owner for 45 years with 7,500+ hours logged, and he is a CFIA/I/ME. He’s founder and CEO of Savvy Aircraft Maintenance Management, Inc., the world’s largest firm providing maintenance-management services for owner-flown aircraft.
The Algorithm Design Manual
Steven S. Skiena - 1997
Drawing heavily on the author's own real-world experiences, the book stresses design and analysis. Coverage is divided into two parts, the first being a general guide to techniques for the design and analysis of computer algorithms. The second is a reference section, which includes a catalog of the 75 most important algorithmic problems. By browsing this catalog, readers can quickly identify what the problem they have encountered is called, what is known about it, and how they should proceed if they need to solve it. This book is ideal for the working professional who uses algorithms on a daily basis and has need for a handy reference. This work can also readily be used in an upper-division course or as a student reference guide. THE ALGORITHM DESIGN MANUAL comes with a CD-ROM that contains: * a complete hypertext version of the full printed book. * the source code and URLs for all cited implementations. * over 30 hours of audio lectures on the design and analysis of algorithms are provided, all keyed to on-line lecture notes.
You Don't Know JS: Up & Going
Kyle Simpson - 2015
With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will:
Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions
Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes
Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript
Advanced Inorganic Chemistry
F. Albert Cotton - 1972
Like its predecessors, this updated Sixth Edition is organized around the periodic table of elements and provides a systematic treatment of the chemistry of all chemical elements and their compounds. It incorporates important recent developments with an emphasis on advances in the interpretation of structure, bonding, and reactivity.From the reviews of the Fifth Edition: "The first place to go when seeking general information about the chemistry of a particular element, especially when up-to-date, authoritative information is desired."--Journal of the American Chemical Society"Every student with a serious interest in inorganic chemistry should have [this book]."--
Journal of Chemical Education
"A mine of information . . . an invaluable guide."--
Nature
"The standard by which all other inorganic chemistry books are judged."--
Nouveau Journal de Chimie
"A masterly overview of the chemistry of the elements."--
The Times of London Higher Education Supplement
"A bonanza of information on important results and developments which could otherwise easily be overlooked in the general deluge of publications."--
Angewandte Chemie
Slanted
H.L. Wegley - 2019
When she finds an orphaned girl, Sam, hidden in some bushes along the Rogue River, in an instant, a bond is formed. AJ quickly learns that Sam's and her guardian's lives are in danger from a team of hired killers. But AJ commits to helping eight-year-old Sam. A competitive athlete, AJ Scott isn't one to quit, give up, or do anything halfway, not even when she and Sam end up in a road race with killers in pursuit.When Hunter Jones's cousin dies, he becomes eight-year-old Samantha Wilson's guardian and sets aside any pursuit of personal happiness. Sam becomes his lot in life, and he loves her dearly. But Hunter, a big data analyst, will soon release a research report proving that the largest Internet search engine in the world is being used by its owners to influence American political thought with the intent of controlling elections. He hints at his findings in a radio interview and the news goes viral. Within hours, a team of hired killers attacks Hunter and Sam, intending to eliminate them and steal his research findings. Hunter hides Sam and eludes the killers. But when he returns, Sam is gone. Enraged, Hunter Jones will storm the gates of Hades to get her back, and whoever took her will pay a steep price.Set in Southern Oregon, Seattle, Washington DC, and Eastern Oregon, near Paulina Lake, Slanted is a gritty, high-action, romantic suspense adventure about commitment, sacrifice, love and faith.
The Haunting of the Hadleigh Estate: Book 0
Conner Donnelly - 2018
But when she gets terrible news that takes her back her uncle’s home there she finds that the town isn’t as innocent as her childhood memories would have her believe. Strange things start to happen in the old house and soon enough Cassie is forced to deal with some hard truths.
Modern Physics
Paul Allen Tipler - 1977
Tipler and Llewellyn's acclaimed text for the intermediate-level course (not the third semester of the introductory course) guides students through the foundations and wide-ranging applications of modern physics with the utmost clarity--without sacrificing scientific integrity.
Woody Allen: Interviews
Robert E. Kapsis - 2006
1935) is one of America's most idiosyncratic filmmakers, with an unparalleled output of nearly one film every year for over three decades. His movies are filled with rapid-fire one-liners, neurotic characters, anguished relationships, and old-time jazz music. Allen's vision of New York--whether in comedies or dramas--has shaped our perception of the city more than any other modern filmmaker. "On the screen," John Lahr wrote in the New Yorker in 1996, "Allen is a loser who makes much of his inadequacy; off-screen, he has created over the years the most wide-ranging oeuvre in American entertainment."Woody Allen: Interviews collects over twenty-five years of interviews with the director of Manhattan, Hannah and Her Sisters, Crimes and Misdemeanors, Bullets Over Broadway, and Annie Hall, for which he won an Oscar. The book's interviews reveal a serious director, often at odds with his onscreen persona as a lovable, slap-stick loser. Allen talks frankly about his rigorous work habits; his biggest artistic influences; the attention he devotes to acting, screenwriting, and directing; and how New York fuels his filmmaking.Along with discussing film techniques and styles, Allen opens up about his love of jazz, his Jewish heritage, and the scandal that arose when he left his longtime partner Mia Farrow for her adopted daughter. Including four interviews from European sources, three of which are now available in English for the first time, Woody Allen: Interviews is a treasure trove of conversations with one of America's most distinctive filmmakers.Robert E. Kapsis is professor of sociology at Queens College and is the author of Hitchcock: The Making of a Reputation. His work has appeared in the Village Voice, Variety, Journal of Popular Film and Video, and Cineaste and at the Museum of Modern Art. Kathie Coblentz is special collections cataloger at the New York Public Library. Kapsis and Coblentz coedited Clint Eastwood: Interviews (University Press of Mississippi).
How to Prove It: A Structured Approach
Daniel J. Velleman - 1994
The book begins with the basic concepts of logic and set theory, to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for a step-by-step breakdown of the most important techniques used in constructing proofs. To help students construct their own proofs, this new edition contains over 200 new exercises, selected solutions, and an introduction to Proof Designer software. No background beyond standard high school mathematics is assumed. Previous Edition Hb (1994) 0-521-44116-1 Previous Edition Pb (1994) 0-521-44663-5
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Fundamentals of Data Structures in C++
Ellis Horowitz - 1995
Fundamentals of Data Structures in C++ offers a complete rendering of basic data structure implementations, enhanced by superior pedagogy and astute analyses.
Writing for Computer Science
Justin Zobel - 1997
For the most part the book is a discussion of good writing style and effective research strategies. Some of the material is accepted wisdom, some is controversial, and some is my opinions. Although the book is brief, it is designed to be comprehensive: some readers may be interested in exploring topics further, but for most readers this book should be suf?cient. The ?rst edition of this book was almost entirely about writing. This e- tion, partly in response to reader feedback and partly in response to issues that arose in my ownexperiences as an advisor, researcher, and referee, is also about research methods. Indeed, the two topics writing about and doing research are not clearly separated. It is a small step from asking how do I write? to askingwhatisitthatIwriteabout? As previously, the guidance on writing focuses on research, but much of the material is applicable to general technical and professional communication. Likewise, the guidance on the practice of research has broader lessons. A pr- titioner trying a new algorithm or explaining to colleagues why one solution is preferable to another should be con?dent that the arguments are built on robust foundations. And, while this edition has a stronger emphasis on research than did the ?rst, nothing has been deleted; there is additional material on research, but the guidance on writing has not been taken away."