Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET


Tony Stubblebine - 2007
    Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries. This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:Supported metacharacters for each language API Regular expression classes and interfaces for Ruby, Java, .NET, and C# Regular expression operators for Perl 5.8 Regular expression module objects and functions for Python Pattern-matching functions for PHP and the vi editor Pattern-matching methods and objects for JavaScript Unicode Support for each of the languages With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.

Hacking the Xbox: An Introduction to Reverse Engineering


Andrew Huang - 2003
    The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.

Power System Analysis and Design [With CDROM]


J. Duncan Glover - 2001
    Like earlier editions of the book, physical concepts are highlighted while also giving necessary attention to math-ematical techniques. Both theory and modeling are developed from simple beginnings so that they can be readily extended to new and complex situations. Beginning in Ch. 3, students are introduced to new concepts critical to analyzing power systems, including coverage of both balanced and unbalanced operating conditions. The authors incorporate new tools and material to aid students with design issues and reflect recent trends in the field. Each book now contains a CD with Power World software. This package is commonly used in industry and will enable students to analyze and simulate power systems. The authors use the software to extend, rather than replace, the fully worked examples provided in previous editions. In the new edition, each Power World Simulator example includes a fully worked hand solution of the problem along with a Power World Simulator case (except when the problem size makes it impractical). The new edition also contains updated case studies on recent trends in the Power Systems field, including coverage of deregulation, increased power demand, economics, and alternative sources of energy. These case studies are derived from real life situations.

Touched with Fire: An Anthology of Poems


Jack Hydes - 1985
    This anthology has two main objectives: to introduce students to a wide range of poetry in English from the last 400 years, and to provide them with guidance on how to approach poetry examinations. The poems are divided into six collections, not by theme or by historical period, but as satisfying small anthologies of twenty-two poems each. Clear guidance is given on what is expected in an essay for a poetry examination, and actual answers are reproduced which help the student analyse what kind of response gets good marks and why.

Modern CTO: Everything you need to know, to be a Modern CTO.


Joel Beasley - 2018
    ―Jacob Boudreau CTO of Stord | Forbes 30 Under 30 Joel's book and show provide incredible insights for young startup developers and fellow CTOs alike. Joel offers a human perspective and real practical advice on the challenges and opportunities facing every Modern CTO. ― Christian Saucier | Entrepreneur and P2P Systems Architect I've really come to respect what Joel is doing in the community. His podcast and book are filling a much needed hole and I'm excited to see what else the future has in store. ― Don Pawlowski Chief Technology Officer at University Tees Modern CTO Everything you need to know to be a Modern CTO. Developers are not CTOs, but developers can learn how to be CTOs. In Modern CTO, Joel Beasley provides readers with an in-depth road map on how to successfully navigate the unexplored and jagged transition between these two roles. Drawing from personal experience, Joel gives a refreshing take on the challenges, lessons, and things to avoid on this journey.Readers will learn how Modern CTOs: Manage deadlines Speak up Know when to abandon ship and build a better one Deal with poor code Avoid getting lost in the product and know what UX mistakes to watch out for Manage people and create momentum … plus much more Modern CTO is the ultimate book when making the leap from developer to CTO. Update: Kindle Formatting issues resolved 5/13/18. Thank you for the feedback.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The C Programming Language


Brian W. Kernighan - 1978
    It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a worldwide best-seller. This second edition brings the classic original up to date to include the ANSI standard. From the Preface: We have tried to retain the brevity of the first edition. C is not a big language, and it is not well served by a big book. We have improved the exposition of critical features, such as pointers, that are central to C programming. We have refined the original examples, and have added new examples in several chapters. For instance, the treatment of complicated declarations is augmented by programs that convert declarations into words and vice versa. As before, all examples have been tested directly from the text, which is in machine-readable form. As we said in the first preface to the first edition, C "wears well as one's experience with it grows." With a decade more experience, we still feel that way. We hope that this book will help you to learn C and use it well.

Frumpy to Fabulous: Flaunting It. Your Ultimate Guide to Effortless Style


Natalie Jobity - 2010
    Your Ultimate Guide to Effortless Style", Natalie Jobity, a professional image consultant, shares with women tips, insider secrets and advice they can use immediately to learn how to dress to enhance their image so they look and feel amazing, inside and out. “Frumpy to Fabulous: Flaunting It” has step-by-step guidance on all the topics you care about: dressing to flatter your figure; determining your personal style; shopping smarter so you fill your closet with the right pieces; working with color; pulling your look together with accessories; dressing to elevate your image at work; and much more. As you read each chapter, Natalie's friendly, engaging, voice empowers you to unleash your style potential and encourages you to dare to express your fabulous. With illustrations showcasing “real” women, summarized tip lists (finding the right jeans, picking a cocktail dress and much more!), exercises and anecdotes based on Natalie's work with hundreds of women, this is a book that you will cherish and refer to time and time again. As you read, you will realize that you are in the midst of more than an image makeover. You are really being taken on a journey of transformation-- a wonderful and exhilarating experience that helps you tap into your true essence and express it by the way you dress. Natalie dishes her advice and wisdom in a down to earth and practical manner that is delivered with motivation and sass. She lets her book lead the way for the woman who is ready for her image to catch up with the rest of her life. This book is an invitation to change how the world sees you and how you see yourself, on your terms. Yes, you too can become one of those effortlessly stylish women you admire. Wherever you are on your image journey-from fashion challenged to emerging fashionista-with Natalie as your guide you will be inspired to "Flaunt It!"

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Java in a Nutshell


David Flanagan - 1996
    And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up.In this latest revision, readers will find "Java in a Nutshell," 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer.To wit, "Java in a Nutshell," 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with.This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, " Java in a Nutshell," 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, "Java in a Nutshell" has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.

The Latex Companion


Frank Mittelbach - 1993
    This completely updated edition brings you all the latest information about LaTeX and the vast range of add-on packages now available--over 200 are covered! Full of new tips and tricks for using LaTeX in both traditional and modern typesetting, this book will also show you how to customize layout features to your own needs--from phrases and paragraphs to headings, lists, and pages. Inside, you will find: Expert advice on using LaTeX's basic formatting tools to create all types of publications--from memos to encyclopedias In-depth coverage of important extension packages for tabular and technical typesetting, floats and captions, multicolumn layouts--including reference guides and discussions of the underlying typographic and TeXnical concepts Detailed techniques for generating and typesetting contents lists, bibliographies, indexes, etc. Tips and tricks for LaTeX programmers and systems support New to this edition: Nearly 1,000 fully tested examples that illustrate the text and solve typographical and technical problems--all ready to run! An additional chapter on citations and bibliographies Expanded material on the setup and use of fonts to access a huge collection of glyphs, and to typeset text from a wide range of languages and cultures Major new packages for graphics, "verbatim" listings, floats, and page layout Full coverage of the latest packages for all types ofdocuments--mathematical, multilingual, and many more Detailed help on all error messages, including those troublesome low-level TeX errors Like its predecessor, The LaTeX Companion, Second Edition, is an indispensable reference for anyone wishing to use LaTeX productively. The accompanying CD-ROM contains a complete plug-and-play LaTeX installation, including all the packages and examples featured in the book.

Doing Data Science


Cathy O'Neil - 2013
    But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to Data Science class, tells you what you need to know.In many of these chapter-long lectures, data scientists from companies such as Google, Microsoft, and eBay share new algorithms, methods, and models by presenting case studies and the code they use. If you’re familiar with linear algebra, probability, and statistics, and have programming experience, this book is an ideal introduction to data science.Topics include:Statistical inference, exploratory data analysis, and the data science processAlgorithmsSpam filters, Naive Bayes, and data wranglingLogistic regressionFinancial modelingRecommendation engines and causalityData visualizationSocial networks and data journalismData engineering, MapReduce, Pregel, and HadoopDoing Data Science is collaboration between course instructor Rachel Schutt, Senior VP of Data Science at News Corp, and data science consultant Cathy O’Neil, a senior data scientist at Johnson Research Labs, who attended and blogged about the course.

Think Python


Allen B. Downey - 2002
    It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.

The Nosferatu Conspiracy: The Sleepwalker


Brian James Gage - 2020
    This contrasts suppressed documents citing the royal family mysteriously disappeared after fires ravaged Saint Petersburg in December 1916 (OS).Grigori Yefimovich Rasputin was supposedly murdered by high-ranking Russian officials on December 16, 1916 (OS), for his unprecedented and perceived nefarious influence over the royal family. He was poisoned, shot twice, and clubbed into submission, yet remained alive. His attackers finally drowned him underneath the icy Neva River.Rasputin’s autopsy was reportedly performed three days later by Professor Kossorotov, a high-ranking Okhrana agent and future Kremlin operative. Cause of death: drowning. The document states Rasputin broke free of his bindings and his fingernails showed signs he’d tried to claw through the ice.The stories surrounding Rasputin’s death are gross falsifications. His body was never recovered for examination, and his status within the Russian intelligence community to this day remains: At Large.This is the true story of Rasputin’s paranormal coup d'etat and his conjuring of ancient vampires that destroyed Saint Petersburg, Russia, in December 1916.History is a lie. The truth will be exposed.

The Design of Design: Essays from a Computer Scientist


Frederick P. Brooks Jr. - 2010
    But what do we really know about the design process? What leads to effective, elegant designs? The Design of Design addresses these questions. These new essays by Fred Brooks contain extraordinary insights for designers in every discipline. Brooks pinpoints constants inherent in all design projects and uncovers processes and patterns likely to lead to excellence. Drawing on conversations with dozens of exceptional designers, as well as his own experiences in several design domains, Brooks observes that bold design decisions lead to better outcomes. The author tracks the evolution of the design process, treats collaborative and distributed design, and illuminates what makes a truly great designer. He examines the nuts and bolts of design processes, including budget constraints of many kinds, aesthetics, design empiricism, and tools, and grounds this discussion in his own real-world examples--case studies ranging from home construction to IBM's Operating System/360. Throughout, Brooks reveals keys to success that every designer, design project manager, and design researcher should know.