Book picks similar to
Handbook of Constraint Programming by Francesca Rossi
ai_to_read
all
artificial-intelligence
computer-books
AngularJS
Brad Green - 2013
This hands-on guide introduces you to AngularJS, the open source JavaScript framework that uses Model–view–controller (MVC) architecture, data binding, client-side templates, and dependency injection to create a much-needed structure for building web apps.Guided by two engineers who worked on AngularJS at Google, you’ll walk through the framework’s key features, and then build a working AngularJS app—from layout to testing, compiling, and debugging. You’ll learn how AngularJS helps reduce the complexity of your web app.Dive deep into Angular’s building blocks and learn how they work togetherGain maximum flexibility by separating logic, data, and presentation responsibilities with MVCAssemble your full app in the browser, using client-side templatesUse AngularJS directives to extend HTML with declarative syntaxCommunicate with the server and implement simple caching with the $http serviceUse dependency injection to improve refactoring, testability, and multiple environment designGet code samples for common problems you face in most web apps
Ajax in Action
Dave Crane - 2005
They get frustrated losing their scroll position; they get annoyed waiting for refresh; they struggle to reorient themselves on every new page. And the list goes on. With asynchronous JavaScript and XML, known as "Ajax," you can give them a better experience. Once users have experienced an Ajax interface, they hate to go back. Ajax is new way of thinking that can result in a flowing and intuitive interaction with the user.Ajax in Action helps you implement that thinking--it explains how to distribute the application between the client and the server (hint: use a "nested MVC" design) while retaining the integrity of the system. You will learn how to ensure your app is flexible and maintainable, and how good, structured design can help avoid problems like browser incompatibilities. Along the way it helps you unlearn many old coding habits. Above all, it opens your mind to the many advantages gained by placing much of the processing in the browser. If you are a web developer who has prior experience with web technologies, this book is for you. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
Design Patterns Explained: A New Perspective on Object-Oriented Design
Alan Shalloway - 2001
"Design Patterns Explained "complements the existing design patterns texts and may perform a very useful role, fitting between introductory texts such as UML Distilled and the more advanced patterns books." James Noble Leverage the quality and productivity benefits of patterns without the complexity! "Design Patterns Explained, Second Edition" is the field's simplest, clearest, most practical introduction to patterns. Using dozens of updated Java examples, it shows programmers and architects exactly how to use patterns to design, develop, and deliver software far more effectively. You'll start with a complete overview of the fundamental principles of patterns, and the role of object-oriented analysis and design in contemporary software development. Then, using easy-to-understand sample code, Alan Shalloway and James Trott illuminate dozens of today's most useful patterns: their underlying concepts, advantages, tradeoffs, implementation techniques, and pitfalls to avoid. Many patterns are accompanied by UML diagrams. Building on their best-selling First Edition, Shalloway and Trott have thoroughly updated this book to reflect new software design trends, patterns, and implementation techniques. Reflecting extensive reader feedback, they have deepened and clarified coverage throughout, and reorganized content for even greater ease of understanding. New and revamped coverage in this edition includesBetter ways to start "thinking in patterns"How design patterns can facilitate agile development using eXtreme Programming and other methodsHow to use commonality and variability analysis to design application architecturesThe key role of testing into a patterns-driven development processHow to use factories to instantiate and manage objects more effectivelyThe Object-Pool Pattern a new pattern not identified by the "Gang of Four"New study/practice questions at the end of every chapter Gentle yet thorough, this book assumes no patterns experience whatsoever. It's the ideal "first book" on patterns, and a perfect complement to Gamma's classic "Design Patterns." If you're a programmer or architect who wants the clearest possible understanding of design patterns or if you've struggled to make them work for you read this book.
Data Analysis Using SQL and Excel
Gordon S. Linoff - 2007
This book helps you use SQL and Excel to extract business information from relational databases and use that data to define business dimensions, store transactions about customers, produce results, and more. Each chapter explains when and why to perform a particular type of business analysis in order to obtain useful results, how to design and perform the analysis using SQL and Excel, and what the results should look like.
Matador
Stewart Matthews - 2018
Experience the gripping first entry in the action-packed Barrett Mason Thriller series! Barrett Mason’s mission was simple: help an Iranian biochemist defect. Extract him to the States then learn the darkest secrets of the Ayatollah’s weapons programs. Iran's deadliest spies would try to kill them along the way, but Barrett never shied away from a fight. Everything was going fine until Barrett was caught in a spy’s worst nightmare: his own side tried to kill him. Trapped between two sides full of expertly trained, cold-blooded killers means standing his ground is suicide. And running will only get him so far. But Barrett Mason never lays down. Not when failure means unleashing the deadliest weapons known to man. He'll fight to get his revenge, or he’ll die trying. Fans of Clancy's Jack Ryan, Child's Jack Reacher, Ludlum's Jason Bourne, and LT Ryan's Jack Noble will be hooked by the heart-pounding, life-or-death adventures of Barrett Mason. Other books in the Barrett Mason Thriller series Book 0: The Lost Son Book 1: Matador Book 2: Tyrant
Network Security: Private Communication in a Public World
Charlie Kaufman - 1995
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.
Higher-Order Perl: Transforming Programs with Programs
Mark Jason Dominus - 2005
However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.• Introduces powerful programming methods—new to most Perl programmers—that were previously the domain of computer scientists• Gradually builds up confidence by describing techniques of progressive sophistication• Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods
Crimson Security
Evie Nichole - 2017
Things are bound to get hot when the men of Crimson Security are involved. Book 1 My name is Darby Connors and I’m in deep. Maybe too deep for me to make it out alive. It isn’t the first time I’ve been in trouble while doing my job, but this time feels different. Something is coming for me. Someone is coming for me. Hendrix Crimson is assigned to guard my body, and guard it, he does. Caught up in the mess I’ve made, he tries to help me solve the case I’m working on so he only has to worry about one killer coming after me. Book 2 My name is Lacey Holt and I do not need help from Jagger Crimson. Someone is messing with my family, and my ranch, trying to drag up painful family memories. They’ve convinced my dad that my brother’s murderer is back and ready to pick off the rest of our family. I know better. I know that I can take care of it without Jagger, too. He’s a constant distraction and all he’ll do is get in my way. Convincing my dad of that is another story. When it becomes clear that the threat is directed at me, he is ready to ship me off to safety. I’m an adult, though. I’m tough. There’s nothing that this hidden bully can do to run me off my family land. Except for kidnap me and lock me away. So, maybe I do need Jagger after all. Not that I’d ever want to admit that to him. Book 3 Left an orphan after a rough childhood, I was taken in by the president of a rough Motorcycle Club. Given plenty of room to grow, I was treated like a princess. Until I wasn’t. When things in the club change and a new president takes his throne, I’m in more danger than ever. Sold and then saved by Jackson, I owe him my life. It’s not anything he’s interested in, though. Jackson comes with baggage, but I get it. I have my own. Who can help that when we unpack it, things get a little messy? Book 4 I’m not who I used to be. Detective Rain Willows died while being held captive by a very bad man. Now, I don’t know who I am. I’m not a cop. I’m barely a human some days. I’m scared. I lost everything. I gained some scars. The bad man is still after me. Thad Brooks has an ax to grind with me, but he feels like the only thing standing between me and death. I don’t want to admit that I’m afraid, or that I need help, but when things get bad enough, I’m not too stubborn to wave the white flag. Book 5 My only desire in life is to get my daughter back. At any cost, including my life. My name is Clara Crimson and I’m not a good person. I live with a monster and I have killed. I don’t deserve to be happy, but she does. Cash Crimson, my ex-husband, has every reason to hate me and he does. He probably would like to watch me die, but he thinks he needs me to find our daughter. What we find isn’t what we expected, though. I’m not sure either of us will survive it. I’m not sure I want to. We have to keep our daughter safe. We have to get close and remember we’re on the same team. It's time to bring down the man who destroyed us.
A Part of Me
Karin Aharon - 2019
It was all so unexpected.And now, she needs to fight the greatest battle of her life.Shirley is preoccupied with her non-stop daily routine: her demanding job at a law firm, raising her 18-month son and maintaining her loving relationship with her husband...Shirley’s busy life is turned upside down when her mother, who lives in Australia, comes over to visit and receives painful news – she has cancer.This terrible discovery is just the tip of the iceberg for Shirley, with many more struggles ahead, that she must face.Against all odds, and despite the challenges in her path, she goes on a long and courageous journey, with a single goal in mind – do everything it takes to be there for her children.
Pragmatic Project Automation
Mike Clark - 2004
Indeed, that's what computers are for. You can enlist your own computer to automate all of your project's repetitive tasks, ranging from individual builds and running unit tests through to full product release, customer deployment, and monitoring the system.Many teams try to do these tasks by hand. That's usually a really bad idea: people just aren't as good at repetitive tasks as machines. You run the risk of doing it differently the one time it matters, on one machine but not another, or doing it just plain wrong. But the computer can do these tasks for you the same way, time after time, without bothering you. You can transform these labor-intensive, boring and potentially risky chores into automatic, background processes that just work.In this eagerly anticipated book, you'll find a variety of popular, open-source tools to help automate your project. With this book, you will learn: How to make your build processes accurate, reliable, fast, and easy. How to build complex systems at the touch of a button. How to build, test, and release software automatically, with no human intervention. Technologies and tools available for automation: which to use and when. Tricks and tips from the masters (do you know how to have your cell phone tell you that your build just failed?) You'll find easy-to-implement recipes to automate your Java project, using the same popular style as the rest of our Jolt Productivity Award-winning Starter Kit books. Armed with plenty of examples and concrete, pragmatic advice, you'll find it's easy to get started and reap the benefits of modern software development. You can begin to enjoy pragmatic, automatic, unattended software production that's reliable and accurate every time.
SLOW DRiP: First in a series of heart-racing thrillers
Gary Polisano - 2019
Clues and taunts left by the killer along with the knowledge held by the teenager cause the three characters to intersect in a dangerous game of cat and mouse.
Deep Learning with Python
François Chollet - 2017
It is the technology behind photo tagging systems at Facebook and Google, self-driving cars, speech recognition systems on your smartphone, and much more.In particular, Deep learning excels at solving machine perception problems: understanding the content of image data, video data, or sound data. Here's a simple example: say you have a large collection of images, and that you want tags associated with each image, for example, "dog," "cat," etc. Deep learning can allow you to create a system that understands how to map such tags to images, learning only from examples. This system can then be applied to new images, automating the task of photo tagging. A deep learning model only has to be fed examples of a task to start generating useful results on new data.
Pro C# 3.0 and the .NET 3.5 Framework (Pro)
Andrew Troelsen - 2007
Since that time, this text has been revised, tweaked, and enhanced to account for the changes found within each release of the .NET platform (1.1, 2.0, 3.0 and now 3.5)..NET 3.0 was more of an augmentative release, essentially providing three new APIs: Windows Presentation Foundation (WPF), Windows Communication Foundation (WCF) and Windows Workflow Foundation (WF). As you would expect, coverage of the "W's" has been expanded a great deal in this version of the book from the previous Special Edition text.Unlike .NET 3.0, .NET 3.5 provides dozens of C# language features and .NET APIs. This edition of the book will walk you through all of this material using the same readable approach as was found in previous editions. Rest assured, you'll find detailed coverage of Language Integrated Query (LINQ), the C# 2008 language changes (automatic properties, extension methods, anonymous types, etc.) and the numerous bells and whistles of Visual Studio 2008. What you'll learn Everything you need to knowget up to speed with C# 2008 quickly and efficiently. Discover all the new .NET 3.5 featuresLanguage Integrated Query, anonymous types, extension methods, automatic properties, and more. Get a professional footholdtargeted to appeal to experienced software professionals, this book gives you the facts you need the way you need to see them. A rock-solid foundationfocuses on everything you need to be a successful .NET 3.5 programmer, not just the new features. Get comfortable with all the core aspects of the platform including assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, and much more. Who this book is forIf you're checking out this book for the first time, understand that it targets experienced software professionals and/or students of computer science (so please don't expect three chapters devoted to "for" loops). The mission of this text is to provide you with a rock-solid foundation to the C# 2008 programming language and the core aspects of the .NET platform (object-oriented programming, assemblies, file IO, Windows Forms/WPF, ASP.NET, ADO.NET, WCF, WF, etc.). Once you digest the information presented in these 33 chapters, you'll be in a perfect position to apply this knowledge to your specific programming assignments, and you'll be well equipped to explore the .NET universe on your own terms. "
Access 2007: The Missing Manual
Matthew MacDonald - 2006
It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.
Programming Game AI by Example
Mat Buckland - 2004
Techniques covered include state- and goal-based behavior, inter-agent communication, individual and group steering behaviors, team AI, graph theory, search, path planning and optimization, triggers, scripting, scripted finite state machines, perceptual modeling, goal evaluation, goal arbitration, and fuzzy logic.