Programming Perl


Tom Christiansen - 1991
    The first edition of this book, Programming Perl, hit the shelves in 1990, and was quickly adopted as the undisputed bible of the language. Since then, Perl has grown with the times, and so has this book.Programming Perl is not just a book about Perl. It is also a unique introduction to the language and its culture, as one might expect only from its authors. Larry Wall is the inventor of Perl, and provides a unique perspective on the evolution of Perl and its future direction. Tom Christiansen was one of the first champions of the language, and lives and breathes the complexities of Perl internals as few other mortals do. Jon Orwant is the editor of The Perl Journal, which has brought together the Perl community as a common forum for new developments in Perl.Any Perl book can show the syntax of Perl's functions, but only this one is a comprehensive guide to all the nooks and crannies of the language. Any Perl book can explain typeglobs, pseudohashes, and closures, but only this one shows how they really work. Any Perl book can say that my is faster than local, but only this one explains why. Any Perl book can have a title, but only this book is affectionately known by all Perl programmers as "The Camel."This third edition of Programming Perl has been expanded to cover version 5.6 of this maturing language. New topics include threading, the compiler, Unicode, and other new features that have been added since the previous edition.

Version Control with Subversion


Ben Collins-Sussman - 2004
    Today's increasingly fast pace of software development--as programmers make small changes to software one day only to undo them the next--has only heightened the problem; consecutive work on code or single-programmer software is a rare sight these days. Without careful attention to version control, concurrent and collaborative work can create more headaches than it solves. This is where Subversion comes into play.Written by members of the Subversion open source development team, Version Control with Subversion introduces the powerful new versioning tool designed to be the successor to the Concurrent Version System or CVS. CVS users will find the "look and feel" Subversion comfortably familiar, but under the surface it's far more flexible, robust, and usable, and more importantly, it improves on CVS's more notable flaws.The book begins with a general introduction to Subversion, the basic concepts behind version control, and a guided tour of Subversion's capabilities and structure. With thorough attention to detail, the authors cover every aspect of installing and configuring Subversion for managing a programming project, documentation, or any other team-based endeavor. Later chapters cover the more complex topics of branching, repository administration, and other advanced features such as properties, externals, and access control. The book ends with reference material and appendices covering a number of useful topics such as a Subversion complete reference and troubleshooting guide.Version Control with Subversion aims to be useful to readers of widely different backgrounds, from those with no previous experience in version control to experienced sysadmins. If you've never used version control, you'll find everything you need to get started in this book. And if you're a seasoned CVS pro, this book will help you make a painless leap into Subversion.

Probabilistic Robotics


Sebastian Thrun - 2005
    Building on the field of mathematical statistics, probabilistic robotics endows robots with a new level of robustness in real-world situations. This book introduces the reader to a wealth of techniques and algorithms in the field. All algorithms are based on a single overarching mathematical foundation. Each chapter provides example implementations in pseudo code, detailed mathematical derivations, discussions from a practitioner's perspective, and extensive lists of exercises and class projects. The book's Web site, www.probabilistic-robotics.org, has additional material. The book is relevant for anyone involved in robotic software development and scientific research. It will also be of interest to applied statisticians and engineers dealing with real-world sensor data.

Stealing the Network: How to Own a Continent


Ryan Russell - 2004
    While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

Field and Wave Electromagnetics


David K. Cheng - 1982
    These include applications drawn from important new areas of technology such as optical fibers, radome design, satellite communication, and microstrip lines. There is also added coverage of several new topics, including Hall effect, radar equation and scattering cross section, transients in transmission lines, waveguides and circular cavity resonators, wave propagation in the ionosphere, and helical antennas. New exercises, new problems, and many worked-out examples make this complex material more accessible to students.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Faster : 100 Ways to Improve Your Digital Life


Ankit Fadia - 2013
    With easy-to-use examples and loads of screenshots, Faster is the perfect digital companion for you.

Solar Energy: The physics and engineering of photovoltaic conversion, technologies and systems


Arno Smets - 2016
    The book is also ideal for university and third-level physics or engineering courses on solar photovoltaics, with exercises to check students' understanding and reinforce learning. It is the perfect companion to the Massive Open Online Course (MOOC) on Solar Energy (DelftX, ET.3034TU) presented by co-author Arno Smets. The course is available in English on the nonprofit open source edX.org platform, and in Arabic on edraak.org. Over 100,000 students have already registered for these MOOCs.

Database Systems: A Practical Approach to Design, Implementation and Management


Thomas M. Connolly - 1995
    Meant for students and professionals, it includes explanations using case studies. The design methodology is divided into conceptual, logical, and physical.

HTML5 for Publishers


Sanders Kleinfeld - 2011
    Learn how to: Intersperse audio/video with textual content Create a graphing calculator to display algebraic equations on the Canvas Use geolocation to customize a work of fiction with details from the reader's locale Use Canvas to add interactivity to a children's picture book

Fundamentals of Database Systems


Ramez Elmasri - 1989
    It features excellent examples and access to Addison Wesley's database Web site that includes further teaching, tutorials and many useful student resources.

In Pursuit of the Unknown: 17 Equations That Changed the World


Ian Stewart - 2012
    We often overlook the historical link between mathematics and technological advances, says Stewart—but this connection is integral to any complete understanding of human history.Equations are modeled on the patterns we find in the world around us, says Stewart, and it is through equations that we are able to make sense of, and in turn influence, our world. Stewart locates the origins of each equation he presents—from Pythagoras's Theorem to Newton's Law of Gravity to Einstein's Theory of Relativity—within a particular historical moment, elucidating the development of mathematical and philosophical thought necessary for each equation's discovery. None of these equations emerged in a vacuum, Stewart shows; each drew, in some way, on past equations and the thinking of the day. In turn, all of these equations paved the way for major developments in mathematics, science, philosophy, and technology. Without logarithms (invented in the early 17th century by John Napier and improved by Henry Briggs), scientists would not have been able to calculate the movement of the planets, and mathematicians would not have been able to develop fractal geometry. The Wave Equation is one of the most important equations in physics, and is crucial for engineers studying the vibrations in vehicles and the response of buildings to earthquakes. And the equation at the heart of Information Theory, devised by Claude Shannon, is the basis of digital communication today.An approachable and informative guide to the equations upon which nearly every aspect of scientific and mathematical understanding depends, In Pursuit of the Unknown is also a reminder that equations have profoundly influenced our thinking and continue to make possible many of the advances that we take for granted.

Options, Futures and Other Derivatives


John C. Hull
    Changes in the fifth edition include: A new chapter on credit derivatives (Chapter 21). New! Business Snapshots highlight real-world situations and relevant issues. The first six chapters have been -reorganized to better meet the needs of students and .instructors. A new release of the Excel-based software, DerivaGem, is included with each text. A useful Solutions Manual/Study Guide, which includes the worked-out answers to the "Questions and Problems" sections of each chapter, can be purchased separately (ISBN: 0-13-144570-7).

An Introduction to General Systems Thinking


Gerald M. Weinberg - 1975
    Used in university courses and professional seminars all over the world, the text has proven its ability to open minds and sharpen thinking.Originally published in 1975 and reprinted more than twenty times over a quarter century -- and now available for the first time from Dorset House Publishing -- the text uses clear writing and basic algebraic principles to explore new approaches to projects, products, organizations, and virtually any kind of system.Scientists, engineers, organization leaders, managers, doctors, students, and thinkers of all disciplines can use this book to dispel the mental fog that clouds problem-solving. As author Gerald M. Weinberg writes in the new preface to the Silver Anniversary Edition, "I haven’t changed my conviction that most people don’t think nearly as well as they could had they been taught some principles of thinking.”Now an award-winning author of nearly forty books spanning the entire software development life cycle, Weinberg had already acquired extensive experience as a programmer, manager, university professor, and consultant when this book was originally published.With helpful illustrations, numerous end-of-chapter exercises, and an appendix on a mathematical notation used in problem-solving, An Introduction to General Systems Thinking may be your most powerful tool in working with problems, systems, and solutions.