Book picks similar to
Programming Abstractions in C++ by Eric S. Roberts
programming
computer-science
c
computation
The Hogarth Way - Two Gripping Crime Mysteries - DI Hogarth Double Bill Set 2: DI Hogarth's The Poison Path and The Deadly Kiss (The DI Hogarth Mysteries Collection)
Solomon Carter - 2021
DETECTIVES HOGARTH AND PALMER ARE CALLED TO THE SCENE.The body belongs to deadbeat actor, Gareth Manning. Initial clues suggest accidental death… but Manning had plenty of reasons to live… and Hogarth soon discovers that the body under the pier isn’t the only mystery in town.No one knows why Gareth Manning died but everyone in the film crew has a theory. Manning was a drinker, a wastrel with a history of falling apart. But Manning had ambition too. DI Hogarth, DS Palmer and DC Simmons must work through the clues and layers of lies… but the deeper they delve, the murkier the mystery gets.A sinister plot is in the offing… Will DI Hogarth be lured into the trap?BOOK 2: THE DEADLY KISSDI Hogarth is on the hunt. But the DI is not the only one looking for prey…DETECTIVE JOE HOGARTH IS ON THE HUNT FOR A KILLER WHO STOLE THE LIFE OF A YOUNG CHRISTIAN GIRL. IT’S TWO WEEKS SINCE THE YOUNG WOMAN'S BODY WAS LEFT ABANDONED IN A BEACH HUT. EVIDENCE IS SLIM, LEADS ARE EXHAUSTED AND DI HOGARTH IS FEELING THE STRAIN... BUT THE MURDER OF YOUNG HELEN BRIMELOW ISN’T THE ONLY CRIME TROUBLING HOGARTH. A WELL-CONNECTED MAN CALLED SIMON DRAWTON HAS GOTTEN AWAY WITH FAR MORE THAN HE SHOULD.COULD IT BE THAT DRAWTON HAS STRUCK AGAIN?HOGARTH SUSPECTS SO. AND HOGARTH IS DETERMINED THAT HE WON'T GET WAY WITH IT.
The Art of Unit Testing: With Examples in .NET
Roy Osherove - 2009
It guides you step by step from simple tests to tests that are maintainable, readable, and trustworthy. It covers advanced subjects like mocks, stubs, and frameworks such as Typemock Isolator and Rhino Mocks. And you'll learn about advanced test patterns and organization, working with legacy code and even untestable code. The book discusses tools you need when testing databases and other technologies. It's written for .NET developers but others will also benefit from this book.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.Table of ContentsThe basics of unit testingA first unit testUsing stubs to break dependenciesInteraction testing using mock objectsIsolation (mock object) frameworksTest hierarchies and organizationThe pillars of good testsIntegrating unit testing into the organizationWorking with legacy code
PIC Microcontroller and Embedded Systems: Using Assembly and C for PIC18
Muhammad Ali Mazidi - 2007
Offering numerous examples and a step-by-step approach, it covers both the Assembly and C programming languages and devotes separate chapters to interfacing with peripherals such as Timers, LCD, Serial Ports, Interrupts, Motors and more. A unique chapter on hardware design of the PIC system and the PIC trainer round out coverage. Systematic coverage of the PIC18 family of Microcontrollers. Assembly language and C language programming and interfacing techniques. Thorough coverage of Architectures and Assembly language programming of the PIC18. Thorough coverage of C language programming of the PIC18. Separate chapters on programming and interfacing the PIC with peripherals - Includes information on how to interface the PIC with LCD, keyboard, ADC, DAC, Sensors, Serial Ports, Timers, DC and Stepper Motors, Optoisolators, and RTC. Covers how to program each peripheral, first using the Assembly language and then using the C language. Those involved with PIC programming and interfacing using Assembly and C languages."
How to Design Programs: An Introduction to Programming and Computing
Matthias Felleisen - 2001
Unlike other introductory books, it focuses on the program design process. This approach fosters a variety of skills--critical reading, analytical thinking, creative synthesis, and attention to detail--that are important for everyone, not just future computer programmers. The book exposes readers to two fundamentally new ideas. First, it presents program design guidelines that show the reader how to analyze a problem statement; how to formulate concise goals; how to make up examples; how to develop an outline of the solution, based on the analysis; how to finish the program; and how to test. Each step produces a well-defined intermediate product. Second, the book comes with a novel programming environment, the first one explicitly designed for beginners. The environment grows with the readers as they master the material in the book until it supports a full-fledged language for the whole spectrum of programming tasks.All the book's support materials are available for free on the Web. The Web site includes the environment, teacher guides, exercises for all levels, solutions, and additional projects.A second edition is now available.
Principles of Information Security
Michael E. Whitman - 2002
Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.
Exploring Requirements: Quality Before Design
Donald C. Gause - 1989
Methodologies Aren't Enough2. Ambiguity in Stating Requirements3. Sources of Ambiguity4. The Tried but Untrue Use of Direct QuestionsPart II: Ways to Get Started5. Starting Points6. Context-Free Questions7. Getting the Right People Involved8. Making Meetings Work for Everybody9. Reducing Ambiguity from Start to FinishPart III: Exploring the Possibilities10. Idea-Generation Meetings11. Right-Brain Methods12. The Project's Name13. Facilitating in the Face of ConflictPart IV: Clarifying Expectations14. Functions15. Attributes16. Constraints17. Preferences18. ExpectationsPart V: Greatly Improving the Odds of Success19. Ambiguity Metrics20. Technical Reviews21. Measuring Satisfaction22. Test Cases23. Studying Existing Products24. Making Agreements25. EndingBibliographyIndex
The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal
M. Mitchell Waldrop - 2001
C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.
The Language of SQL
Larry Rockoff - 2010
For SQL beginners, it's more important for a book to focus on general concepts and offer clear explanations and examples of what the various statements can accomplish. This is that beginner book. A number of features make The LANGUAGE OF SQL unique among introductory SQL books. First, you will not be required to download software or sit with a computer as you read the text. The intent of this book is to provide examples of SQL usage that can be understood simply by reading them. Second, topics are organized in an intuitive and logical sequence. SQL keywords are introduced one at a time, allowing you to build on your prior understanding as you encounter new words and concepts. Finally, this book covers the syntax of three widely used databases: Microsoft SQL Server, MySQL, and Oracle, with special "Database Differences" boxes that will show you any differences in the syntax among those three databases, as well as instructions on how to obtain and install free versions of the databases. This is the only book you'll need to gain a working knowledge of SQL and relational databases.
30 Arduino Projects for the Evil Genius
Simon Monk - 2010
You'll master Arduino through a series of projects while learning the required simplified C programming.
XOXO, Winter
Nikki Bloom - 2019
But taking that initial leap of faith is difficult when you’ve tumbled in the turmoil of your past and you know just how much it hurts to relive it. I get it. I’ve been there. I’ve made my fair share of mistakes when it comes to the dating department. And as far as I’m concerned, most men are complete assholes. So why should I waste my mine? It’ll always end the same. Or, at least, that’s what I kept telling myself as I kept my head down and focused on becoming a veterinarian. Forget them, I repeated over and over again. You don’t need them. How many times have you cried for them and they never shed a single tear for you? Maybe that voice in the back of my head had a point but what’s the point of living if you’re always on your own? Because, trust me, being alone sucks. And the constant silence of an empty apartment is a surefire way to insanity. So, why am I so opposed to Dr. Goodman? The dreamboat that fell out of the sky and practically landed on my lap due to a little airplane mix up. Because I’m afraid that he’s going to turn out like every other lowlife that’s ever shown their interest in me. And I’m not about to get my heart broken by a surgeon even if he knows how to stitch it back together again. I think I’ll just save myself the pain.
"If I Die...": A True Story of Obsessive Love, Uncontrollable Greed, and Murder (St. Martin's True Crime Library)
Michael Fleeman - 2002
He'd been shot at least four times in the head, decapitated, and set on fire. Who could have turned on the ambitious real-estate ace with such bloodthirsty fury? Even before the remains were found, circumstantial evidence was building against Rudin's tempestuous 52-year-old wife, Margaret, who stood to inherit a handsome share of her husband's fortune. Rudin's friends also suspected Margaret, and Rudin himself had thought that his wife was trying to poison him when he was alive. Then a chilling caveat was discovered in Rudin's living trust: that should he die under violent circumstances, an investigation should be conducted. By the time authorities closed in on Margaret Rudin, she'd disappeared. It would take two-and-a-half years to hunt the Black Widow down, and to discover the cold-blooded secrets at the heart of a poisonous marriage....BUT VENGEANCE WOULD COME-FROM THE GRAVE.... Now, reporter Michael Fleeman delivers a startling glimpse into the mind of a woman who would stop at nothing to get what she wanted as she drove the man who had promised to love and honor her to secretly fear her. Fleeman also details the relentless pursuit of justice that would lead authorities from the glamorous faade of Las Vegas to a squalid apartment on the outskirts of Boston to hold the remorseless wife accountable for her shocking and unfathomable crimes.
Fundamentals of Database Systems
Ramez Elmasri - 1989
It features excellent examples and access to Addison Wesley's database Web site that includes further teaching, tutorials and many useful student resources.
Internet & World Wide Web: How to Program
Paul Deitel - 1999
Internet and World Wide Web How to Program, 4e introduces students with little or no programming experience to the exciting world of Web-Based applications. The book has been substantially revised to reflect today's Web 2.0 rich Internet application-development methodologies. A comprehensive book that teaches the fundamentals needed to program on the Internet, this text provides in-depth coverage of introductory programmming principles, various markup languages (XHTML, Dynamic HTML and XML), several scripting languages (JavaScript, PHP, Ruby/Ruby on Rails and Perl); AJAX, web services, Web Servers (IIS and Apache) and relational databases (MySQL/Apache Derby/Java DB) -- all the skills and tools needed to create dynamic Web-based applications. The text contains comprehensive introductions to ASP.NET 2.0 and JavaServer Faces (JSF). Hundreds of live-code examples of real applications throughout the book available for download allow readers to run the applications and see and hear the outputs.The book provides instruction on building Ajax-enabled rich Internet applications that enhance the presentation of online content and give web applications the look and feel of desktop applications. The chapter on Web 2.0 and Internet business exposes readers to a wide range of other topics associated with Web 2.0 applications and businesses After mastering the material in this book, students will be well prepared to build real-world, industrial strength, Web-based applications.
Introductory Linear Algebra: An Applied First Course
Bernard Kolman - 1988
Calculus is not a prerequisite, although examples and exercises using very basic calculus are included (labeled Calculus Required.) The most technology-friendly text on the market, Introductory Linear Algebra is also the most flexible. By omitting certain sections, instructors can cover the essentials of linear algebra (including eigenvalues and eigenvectors), to show how the computer is used, and to introduce applications of linear algebra in a one-semester course.
Ethics in Information Technology
George W. Reynolds - 2002
This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.