Book picks similar to
Practical Cryptography in Python: Learning Correct Cryptography by Example by Seth James Nielson
pdf-library
purchased_tech-books
science-engineering
technical
University Physics with Modern Physics
Hugh D. Young - 1949
Offering time-tested problems, conceptual and visual pedagogy, and a state-of-the-art media package, this 11th edition looks to the future of university physics, in terms of both content and approach.
ServSafe Essentials
National Restaurant Association - 1999
ServSafe(R) Essentials, 5th edition was designed with managers' needs in mind. This edition has been updated to reflect the changing needs of a diverse and expanding workforce in the foodservice and restaurant industry. The streamlined delivery of food safety content in the Fifth Edition will create a learning experience that is activity-based and easily comprehended by a variety of learners. The updated book will help readers prepare for examinations, and more importantly, it will promote adherence to food safety practices in the operation. Based on a new job task analysis revised exclusively for the Fifth Edition, the book reflects the latest updates to the "FDA Food Code," new science-based and industry best practices and prepares readers for the ServSafe(R) Food Protection Manager Certification Exam.
Designing Bots: Creating Conversational Experiences
Amir Shevat - 2017
In this practical guide, author Amir Shevat shows you how to design and build great conversational experiences and delightful bots that makes people s life more fun and productive.You ll explore several real-world bot examples to understand what works and what doesn t, and learn practical design patterns for your own bot-building toolbox. This book is ideal for beginners and intermediate designers, as well as senior professionals exploring the conversational user experience paradigm. No coding experience or prior knowledge of conversational UI is required.Learn what bots are, and understand bot types and major components that compose a botExplore different use-cases of bots and best practices around these use casesExamine real-life examples and learn from their experienceUnderstand the bot anatomy (Onboarding, Notifications, Conversations, Advance UI controls) and their associated design patternsPrototype your own first bot and experiment with user feedback"
Mechanics of Materials
Ferdinand P. Beer - 1981
This new edition features an updated art and photo program as well as numerous new and revised homework problems.
Assembly Language: Step-By-Step
Jeff Duntemann - 1992
It then builds systematically to cover all the steps involved in writing, testing, and debugging assembly programs. It also provides valuable how-to information on using procedures and macros. The only guide to assembly programming covering both DOS and Linux, the book presents working example programs for both operating system, and introduces Conditional Assembly -- a technique for assembling for both DOS and Linux systems from a single source file.
Other People's Money: The Rise and Fall of Britain's Boldest Credit Card Fraudster
Neil Forsyth - 2007
Until, at the tender age of sixteen, he worked out how to use the credit card system to his advantage. Identifying the banks' security weaknesses, utilising his intelligence and charm, Elliot embarked on a massive spending spree. From London to New York, Ibiza to Beverly Hills, he lived the fantasy life, staying in famous hotels, flying first class, blowing a fortune on designer clothes. Time and time again, Elliot managed to wriggle free of the numerous authorities who were on his tail, while his life spiralled out of control. Meanwhile, from a police station at Heathrow, a detective was patiently tracking him down . . . With a likeable hero, filled with humour and as fast-paced as a thriller, Other People's Money is crime writing at its best.'A fascinating and illuminating story' Irvine Welsh'Exhilarating Brit variation on Catch Me if You Can, which never misses an opportunity to up the sweaty-palmed suspense.' "Arena"
Probability, Random Variables and Stochastic Processes with Errata Sheet
Athanasios Papoulis - 2001
Unnikrishna Pillai of Polytechnic University. The book is intended for a senior/graduate level course in probability and is aimed at students in electrical engineering, math, and physics departments. The authors' approach is to develop the subject of probability theory and stochastic processes as a deductive discipline and to illustrate the theory with basic applications of engineering interest. Approximately 1/3 of the text is new material--this material maintains the style and spirit of previous editions. In order to bridge the gap between concepts and applications, a number of additional examples have been added for further clarity, as well as several new topics.
The Laws of Thermodynamics: A Very Short Introduction
Peter Atkins - 1990
From the sudden expansion of a cloud of gas to the cooling of hot metal--everything is moved or restrained by four simple laws. Written by Peter Atkins, one of the world's leading authorities on thermodynamics, this powerful and compact introduction explains what these four laws are and how they work, using accessible language and virtually no mathematics. Guiding the reader a step at a time, Atkins begins with Zeroth (so named because the first two laws were well established before scientists realized that a third law, relating to temperature, should precede them--hence the jocular name zeroth), and proceeds through the First, Second, and Third Laws, offering a clear account of concepts such as the availability of work and the conservation of energy. Atkins ranges from the fascinating theory of entropy (revealing how its unstoppable rise constitutes the engine of the universe), through the concept of free energy, and to the brink, and then beyond the brink, of absolute zero. About the Series: Combining authority with wit, accessibility, and style, Very Short Introductions offer an introduction to some of life's most interesting topics. Written by experts for the newcomer, they demonstrate the finest contemporary thinking about the central problems and issues in hundreds of key topics, from philosophy to Freud, quantum theory to Islam.
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Programming in Python 3: A Complete Introduction to the Python Language
Mark Summerfield - 2008
It brings together all the knowledge needed to write any program, use any standard or third-party Python 3 library, and create new library modules of your own.
Python in a Nutshell
Alex Martelli - 2003
Demonstrates the programming language's strength as a Web development tool, covering syntax, data types, built-ins, the Python standard module library, and real world examples
Data Communications and Networking
Behrouz A. Forouzan - 2000
It presents the fundamentals in a clear manner, using a visual approach and real life applications.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Materials Science and Engineering: An Introduction
William D. Callister Jr. - 1985
For examples see chapters 3, 4, 5 and 9. * Mechanical property coverage The Sixth Edition maintains its extensive, introductory level coverage of mechanical properties and failure--the most important materials considerations for many engineers. For examples see chapters 6, 7, & 8. * A picture is worth 1000 words! The Sixth Edition judiciously and extensively makes use of illustrations and photographs. The approximate 500 figures include a large number of photographs that show the microstructure of various materials (e.g., Figures 9.12, 10.8, 13.12, 14.15 and 16.5). * Current and up-to-date Students are presented with the latest developments in Material Science and Engineering. Such up-to-date content includes advanced ceramic and polymeric materials, composites, high-energy hard magnetic materials, and optical fibers in communications. For examples see sections 13.7, 15.19, 16.8, 20.9, and 21.14. * Why study These sections at the beginning of each chapter provide the student with reasons why it is important to learn the material covered in the chapter. * Learning objectives A brief list of learning objectives for each chapter states the key learning concepts for the chapter. * Resources to facilitate the materials selection process. Appendix B, which contains 11 properties for a set of approximately 100 materials, is included which be used in materials selection problems. An additional resource, Appendix C, contains the prices for all materials listed in Appendix B. * The text is packaged with a CD-ROM that contains 1) interactive software modules to enhance visualization of three-dimensional objects, 2) additional coverage of select topics, and 3) complete solutions to selected problems from the text in order to assist students in mastering problem-solving.
Problem Solving with Algorithms and Data Structures Using Python
Bradley N. Miller - 2005
It is also about Python. However, there is much more. The study of algorithms and data structures is central to understanding what computer science is all about. Learning computer science is not unlike learning any other type of difficult subject matter. The only way to be successful is through deliberate and incremental exposure to the fundamental ideas. A beginning computer scientist needs practice so that there is a thorough understanding before continuing on to the more complex parts of the curriculum. In addition, a beginner needs to be given the opportunity to be successful and gain confidence. This textbook is designed to serve as a text for a first course on data structures and algorithms, typically taught as the second course in the computer science curriculum. Even though the second course is considered more advanced than the first course, this book assumes you are beginners at this level. You may still be struggling with some of the basic ideas and skills from a first computer science course and yet be ready to further explore the discipline and continue to practice problem solving. We cover abstract data types and data structures, writing algorithms, and solving problems. We look at a number of data structures and solve classic problems that arise. The tools and techniques that you learn here will be applied over and over as you continue your study of computer science.