Book picks similar to
The Mathematica GuideBook for Symbolics (w/ DVD) by Michael Trott
brillant
computer-science
later
mathematica
Hidden In Plain Sight 10: How To Program A Quantum Computer
Andrew H. Thomas - 2018
This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.
Algorithms
Robert Sedgewick - 1983
This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.
A License to Heal: Random Memories of an ER Doctor
Steven Bentley - 2014
is an American Board of Emergency Medicine certified ED doctor. His journey began in the mid-1970s, when he chose to pursue a career in medicine. In his youthful perspective, he came to regard doctors as the good guys, the ones who healed people and saved lives. He knew he’d be one of those good guys one day. Now, with a career spanning more than thirty years, he works as an emergency-room physician in North Carolina. In A License to Heal: Random Memories of an ER Doctor, Bentley describes the real world of emergency medicine from the viewpoint of a practicing physician. This memoir is filled with real-life stories of the ER, including life and death, triumph and tragedy. Meet a man named Solomon Darby, who spoke to long-dead relatives during his own near-death experience. Bentley also recalls the heartbreaking story of a young widow who desperately needed to understand and cope with the death of her husband. Amid the grief, there are also episodes of great humor and human comedy. In the dynamic world of emergency medicine, there is a great deal of pain, blood, and tragedy, but there is also hope, compassion, and excitement—for both the patients and the staff."
Can't Leave It Alone
Nicole Jackson - 2015
Ryan is no exception to the rule. Her man Desmond and her brother Bryan are hustling hard together, while she enjoys the fruits of their labor. The flashy clothes, cars, and jewelry that most young people only dreamed about was a reality for her. But everything has a price. One fateful night changes their lives forever, giving Ryan a wake-up call like no other.In Ryan’s eyes, Desmond just can’t seem to leave the game alone, but she’s done. Deciding that the fast life wasn’t for her, she walks away from it all, including the love of her life. Situations force them to move on, but the heart wants what the heart wants. Will love bring her back to her man? Or will the allure of the game prove too strong for Desmond, creating a permanent wedge between him and Ryan?Can’t Leave it Alone is a novel about love in its simplest form. If you let it go, and it’s true…it will always come back to you. The question is: what kind of problems it will bring when it returns.
Triassic
Julian Michael Carver - 2020
They are unsure of what happened in space or how they crashed into an uncharted planet. Upon exploration of the new world, they soon realize their destination: The Triassic, the first chapter of the Mesozoic Era. A plan is formulated to escape this terrifying landscape plagued with dinosaurs and prehistoric beasts. The survivors soon discover that there may be an even larger threat looming under the trees than just the dinosaurs, threatening to cut their mission short and trap them all forever in the primitive depths of the Triassic.
Dream and Drake 2: A Cartel Love Story
Princess Diamond - 2017
Dream leaves the precinct with a heavy heart. Drake tries to give her some space, but she has no intentions of taking a break from him. She wants to reconcile things that night so that they can be happy in the morning. After another altercation with Channa, Drake’s wife, Dream realizes that her relationship with Drake is not the fairytale life that she thinks it is. Winning Drake back will not be as easy as she thought. Channa will not allow Dream to step into the picture and steal Drake away without a fight. Channa will kill for him. Not only is Channa a beautiful bombshell, she is Drake’s trap queen too. There is nothing that Channa won’t do for her man, as long as he chooses her. She can be vindictive, secretive, and scandalous if need be. The beef in the streets is brewing. Before Drake knows it, he is in a world of chaos. His businesses are under attack and his family is under fire. Bullets are being hailed everywhere. For the first time in Drake’s life, he fails. Now, he doesn’t know if he should tell The Cartel or not. Breeze has no idea that Bey is kidnapped. He thinks that she is still angry with him. After Dream is hurt badly, Breeze tries to look for Bey, but his pride and hot-headed way of thinking won’t allow him to search too long. He’s convinced that she’s moved on and he’s determined to do the same. Will Dream and Drake end up together like they planned? Will Breeze find Bey? Or will the chaos surrounding their love prevent them from blossoming?
Steve Jobs Ek Zapatlela Tantradnya (Marathi)
ATUL KAHATE ACHYUT GODBOLE - 2011
The PCs, the i- phones, the i-pods, the tablet PCs all will be a constant reminder of the genuine and witty ways that Steve handled and fondled. He was always lost in a world of his own. He hugged the glory and the downfalls with equal aloofness. Not once were his beliefs shattered. Throughout his life, he struggled and dared to bring his dreams come true. His dreams had a silvery lining of consistency, persuasion and intention. He was unique in every way. The life threatening disease of cancer could not prevent him from working till his last breath, literally. Though stubborn and dominant by nature he stood as a magician in the field of technology. Here is a simple gesture to pay him respect and honour. A magnificent journey presented authentically.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin D. Mitnick - 2011
While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)
The LogStash Book
James Turnbull - 2013
We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.
802.11 Wireless Networks: The Definitive Guide
Matthew S. Gast - 2002
Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Effective Perl Programming
Joseph Hall - 1997
The language features full support for regular expressions, object-oriented modules, network programming, and process management. Perl is extensible, and supports modular, cross-platform development.In "Effective Perl Programming," Perl experts Joseph Hall and Randal Schwartz share programming solutions, techniques, programming pointers, rules of thumb, and the pitfalls to avoid, enabling you to make the most of Perl's power and capabilities.The authors will help you develop a knack for the right ways to do things. They show you how to solve problems with Perl, and how to debug and improve your Perl programs. Offering examples, they help you learn good Perl style. Geared for programmers who have already acquired Perl basics, the book will extend your skill range, providing the tactics and deeper understanding you need to create Perl programs that are more elegant, effective, and succinct. This book also speaks to those who want to become more fluent, expressive, and individualistic Perl programmers.To help you design and write effective Perl progams, Effective Perl Programming includes: Perl basics Idiomatic Perl Regular expressions Subroutines References Debugging Usage of packages and modules Object-oriented programming Useful and interesting Perl miscellanyNumerous thought-provoking examples appear throughout the book, highlighting many of the subtleties that make Perl such a fascinating, fun, and effective language to work with.
The Language of SQL
Larry Rockoff - 2010
For SQL beginners, it's more important for a book to focus on general concepts and offer clear explanations and examples of what the various statements can accomplish. This is that beginner book. A number of features make The LANGUAGE OF SQL unique among introductory SQL books. First, you will not be required to download software or sit with a computer as you read the text. The intent of this book is to provide examples of SQL usage that can be understood simply by reading them. Second, topics are organized in an intuitive and logical sequence. SQL keywords are introduced one at a time, allowing you to build on your prior understanding as you encounter new words and concepts. Finally, this book covers the syntax of three widely used databases: Microsoft SQL Server, MySQL, and Oracle, with special "Database Differences" boxes that will show you any differences in the syntax among those three databases, as well as instructions on how to obtain and install free versions of the databases. This is the only book you'll need to gain a working knowledge of SQL and relational databases.