Book picks similar to
iOS Drawing: Practical UIKit Solutions by Erica Sadun


ios_osx_android_e<br/>tc_dev
abandoned
computer-science
indb

Arduino Cookbook


Michael Margolis - 2010
    This simple microcontroller board lets artists and designers build a variety of amazing objects and prototypes that interact with the physical world. With this cookbook you can dive right in and experiment with more than a hundred tips and techniques, no matter what your skill level is.The recipes in this book provide solutions for most common problems and questions Arduino users have, including everything from programming fundamentals to working with sensors, motors, lights, and sound, or communicating over wired and wireless networks. You'll find the examples and advice you need to begin, expand, and enhance your projects right away.Get to know the Arduino development environmentUnderstand the core elements of the Arduino programming languageUse common output devices for light, motion, and soundInteract with almost any device that has a remote controlLearn techniques for handling time delays and time measurementUse simple ways to transfer digital information from sensors to the Arduino deviceCreate complex projects that incorporate shields and external modulesUse and modify existing Arduino libraries, and learn how to create your own

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Introduction to Computer Theory


Daniel I.A. Cohen - 1986
    Covers all the topics needed by computer scientists with a sometimes humorous approach that reviewers found refreshing. The goal of the book is to provide a firm understanding of the principles and the big picture of where computer theory fits into the field.

Bottomless Cups


Joel Bresler - 2020
    What began as a mutual interest in sneak-reading comic books in class evolved into a friendship which has outlasted a great many Presidents and a whole lot more, besides.Teddy and Ray, along with two other boys, formed the core of a group of kids who did everything together. As teenagers, they discovered that restaurants gave free coffee refills even if you didn't order anything else, leading to a lifetime's worth of bottomless cups and frustrated restaurant owners. Now in advanced age, Teddy and Ray still meet regularly to drink too much coffee and talk about the things old guys usually tend to talk about. In between, they flash back to various times and events which helped shape their lives.One of their once-close group, who has enjoyed a modestly successful career in Hollywood, comes up with the idea of making a movie about their youthful experiences together and what came after for each of them. This would, of course, include starring the surviving originals as the present-day versions of their cinematic selves. For some, however, facing their past, present and inevitable future all in one sitting proves considerably more difficult than it looks on the silver screen.

Stella and Sol: The Complete Series


Kimberly Loth - 2017
    Once there, I have to find a way to convince their princess to marry me. If I fail…the baby will die.And then…. Death will come upon us all.  Download it now! Other books by Kimberly Loth Stella and Sol (Young Adult Fantasy) God of the SunPrince of the MoonKing of the StarsQueen of the DawnStella and Sol Box Set The Thorn Chronicles (Young Adult Paranormal) Midnight AngelDestroyer AngelFallen AngelGuardian AngelThe Thorn Chronicles Boxed Set The Dragon Kings (Young Adult Paranormal) ObsidianAspenValentineSkyeThe KingsThe Dragon Kings Boxed Set Omega Mu Alpha Brothers (Sweet Romance Series) Snowfall and SecretsPyramids and PromisesFolly and ForeverMonkeys and MayhemOmega Mu Alpha Brothers Boxed Set Books 1-4Roadtrips and RomanceChristmas and Commitment Sons of the Sand (Young Adult Paranormal) The Smoking LampThe Blazing GlassThe Glowing SandsThe Exploding SkySons of the Sand Box Set Young Adult Contemporary BittersweetSomething About Forever

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

Cracking the PM Interview: How to Land a Product Manager Job in Technology


Gayle Laakmann McDowell - 2013
    Cracking the PM Interview is a comprehensive book about landing a product management role in a startup or bigger tech company. Learn how the ambiguously-named "PM" (product manager / program manager) role varies across companies, what experience you need, how to make your existing experience translate, what a great PM resume and cover letter look like, and finally, how to master the interview: estimation questions, behavioral questions, case questions, product questions, technical questions, and the super important "pitch."

The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary


Eric S. Raymond - 1999
    According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.

Cryptography and Network Security


Behrouz A. Forouzan - 2007
    In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.

Inside of a Dog: What Dogs See, Smell, and Know


Alexandra Horowitz - 2009
    The answers will surprise and delight you as Alexandra Horowitz, a cognitive scientist, explains how dogs perceive their daily worlds, each other, and that other quirky animal, the human.Temple Grandin meets Stephen Pinker in this engaging and informative look at what goes on inside the minds of dogs—from a cognitive scientist with a background at The New Yorker.With more than 52 million pet dogs in America today, it’s clear we are a nation of unabashed dog-lovers. Yet the relationship between dogs and humans remains a fascinating mystery, as no one really knows what goes on in the canine mind. Now, in Inside of a Dog, Alexandra Horowitz fuses her perspectives as both scientist and dog-owner to deliver a fresh look at the world of dogs—as seen from the animal’s point of view. Inspired by her years of living with her own dog, Pumpernickel, who was a constant source of delight and mystery, Horowitz’s mind became filled with questions and ideas. In crisp, clear prose, she draws on her research in the field of dog cognition to give readers a sense of a dog’s perceptual and cognitive abilities—and paints a picture of what the canine experience is like. Horowitz’s own scientific journey, and the insights she uncovered, allowed her to understand her dog better and appreciate her more.Containing up-to-the minute research and providing many moments of dog-behavior recognition, this lively and absorbing book helps dog owners to see their best friend’s behavior in a different, and revealing light, allowing them to understand their pets and enjoy their company even more.

Death's Collector


Bill McCurry - 2019
    Sorcerers must give up things and people they love, or accept things they despise, to gain magical power. The sorcerer Bib saves his daughter by accepting a curse to murder people, and only Death knows how many Bib must kill. He tries to slay only evil people, but soon finds he's also killing people who are merely bad, or who might someday become bad. Bib chases a brutal sorcerer to help a woman rescue her boy, mainly because he expects a lot of killing. But he doesn't expect to unearth obscure magic, enslave spiteful supernatural beings, and strike ghastly bargains with the childish gods. And the last thing he expects is to face the question--is he a good man cursed to crave murder, or has he always been a murderer at heart?

Go in Action


William Kennedy - 2014
    The book begins by introducing the unique features and concepts of Go. Then, you'll get hands-on experience writing real-world applications including websites and network servers, as well as techniques to manipulate and convert data at speeds that will make your friends jealous.

How to Solve It: A New Aspect of Mathematical Method


George Pólya - 1944
    Polya, How to Solve It will show anyone in any field how to think straight. In lucid and appealing prose, Polya reveals how the mathematical method of demonstrating a proof or finding an unknown can be of help in attacking any problem that can be reasoned out--from building a bridge to winning a game of anagrams. Generations of readers have relished Polya's deft--indeed, brilliant--instructions on stripping away irrelevancies and going straight to the heart of the problem.

You Were Made for More: The Life You Have, the Life God Wants You to Have


Jim Cymbala - 2008
    Whether you feel restless or satisfied right now, Jim Cymbala believes that God has more for you. In this new book, he'll help you find out how to access the 'more' God intends---more peace, real joy, and a deeper sense of purpose. As you open yourself up to the 'more' of God, you will also discover your unique work assignment---the one thing God is calling you--and no one else--to accomplish for the sake of his work in the world.

Python Machine Learning


Sebastian Raschka - 2015
    We are living in an age where data comes in abundance, and thanks to the self-learning algorithms from the field of machine learning, we can turn this data into knowledge. Automated speech recognition on our smart phones, web search engines, e-mail spam filters, the recommendation systems of our favorite movie streaming services – machine learning makes it all possible.Thanks to the many powerful open-source libraries that have been developed in recent years, machine learning is now right at our fingertips. Python provides the perfect environment to build machine learning systems productively.This book will teach you the fundamentals of machine learning and how to utilize these in real-world applications using Python. Step-by-step, you will expand your skill set with the best practices for transforming raw data into useful information, developing learning algorithms efficiently, and evaluating results.You will discover the different problem categories that machine learning can solve and explore how to classify objects, predict continuous outcomes with regression analysis, and find hidden structures in data via clustering. You will build your own machine learning system for sentiment analysis and finally, learn how to embed your model into a web app to share with the world