Book picks similar to
Code as Creative Medium: A Handbook for Computational Art and Design by Golan Levin
computer-science
tbr-nonfic
waiting
Big Data for Dummies
Judith Hurwitz - 2013
Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work.Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more Provides essential information in a no-nonsense, easy-to-understand style that is empowering Big Data For Dummies cuts through the confusion and helps you take charge of big data solutions for your organization.
Beginning Ruby: From Novice to Professional
Peter Cooper - 2007
However, it is an extremely powerful and versatile programming language in its own right. It focuses on simplicity and offers a fully object-oriented environment."Beginning Ruby" is a thoroughly contemporary guide for every type of reader who wants to learn Ruby, from novice programmers to web developers to Ruby newcomers. It starts by explaining the principles behind object-oriented programming and within a few chapters builds toward creating a genuine Ruby application.The book then explains key Ruby principles, such as classes and objects, projects, modules, and libraries, and other aspects of Ruby such as database access. In addition, Ruby on Rails is covered in depth, and the books appendixes provide essential reference information as well as a primer for experienced programmers. What you'll learn Understand the basics of Ruby and object-oriented building blocks. Work with Ruby libraries, gems, and documentation. Work with files and databases. Write and deploy Ruby applications. Explore Ruby web frameworks and aspects of network programming with Ruby. Develop desktop and GUI applications with Ruby. Who this book is forBeginning programmers, programmers new to Ruby, and web developers interested in knowing the foundations of the language. "
Programming with Java: A Primer
E. Balagurusamy - 2006
The language concepts are aptly explained in simple and easy-to-understand style, supported with examples, illustrations and programming and debugging exercises.
Shiftless
Linton Bowers - 2019
Unlike werewolves, I can't change shape.
With the help of a couple of beautiful, dynamic, and powerful Lycan women, I begin to learn where my power lies and how to tap into it.Along the way, we uncover a secret that could change the hidden world of monsters forever.But, someone doesn’t want their secrets exposed.Pursued by an enraged werewolf alpha and his ferocious pack, the women and I must do whatever it takes to survive.Our world needs to know the dirty secrets buried just beneath the surface.Join the pack, and once this wild ride is over—there will be free beer and popcorn for all!
Caution! Here there be a harem.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
MySQL Cookbook
Paul DuBois - 2002
Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers of all levels who don't have the time (or expertise) to solve MySQL problems from scratch.The new edition covers MySQL 5.0 and its powerful new features, as well as the older but still widespread MySQL 4.1. One major emphasis of this book is how to use SQL to formulate queries for particular kinds of questions, using the mysql client program included in MySQL distributions. The other major emphasis is how to write programs that interact with the MySQL server through an API. You'll find plenty of examples using several language APIs in multiple scenarios and situations, including the use of Ruby to retrieve and format data. There are also many new examples for using Perl, PHP, Python, and Java as well.Other recipes in the book teach you to:Access data from multiple tables at the same time Use SQL to select, sort, and summarize rows Find matches or mismatches between rows in two tables Determine intervals between dates or times, including age calculations Store images into MySQL and retrieve them for display in web pages Get LOAD DATA to read your data files properly or find which values in the file are invalid Use strict mode to prevent entry of bad data into your database Copy a table or a database to another server Generate sequence numbers to use as unique row identifiers Create database events that execute according to a schedule And a lot moreMySQL Cookbook doesn't attempt to develop full-fledged, complex applications. Instead, it's intended to assist you in developing applications yourself by helping you get past problems that have you stumped.
Cinderella Man: The James J. Braddock Story
Michael DeLisa - 2005
His boxing career blighted by broken hands, the New York Irishman had won five of his previous 21 bouts and had been forced to quit. The Great Depression was at its height. When work dried up on the Hudson River docks, Braddock was forced to claim welfare relief to feed his young family.Then came a visit from his old manager, asking if he wanted one more fight. Desperate for money, Braddock had no choice but to say yes. Four wins later, he was the heavyweight champion of the world in the greatest upset in the sport’s history.Braddock’s rags-to-riches success led Damon Runyon to call him the Cinderella Man. His story captivated the nation in much the way the racehorse Seabiscuit’s would a few years later. Braddock came to represent the struggle for survival facing many families in mid-1930s America.James J. Braddock was born in New York City in 1906, one of seven children. He developed an early taste for fighting and quit school to work a series of menial jobs before resolving to pursue his boxing dream. Over the next decade he became a contender, before injury ruined his prospects. Redemption came on the night of June 13, 1935, with his famous victory over the outrageous champion Max Baer. Braddock would later lose his title to the great Joe Louis, but his place as the people’s champion was cemented forever.Author Michael DeLisa is historical consultant on a major motion picture entitled The Cinderella Man, starring Russell Crowe and Renée Zellweger, to be released in the summer of 2005.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
The Monster Spawn
Deckhard Davis - 2017
He’s more than a little perturbed to discover that he is dead, but it’s not the end of the world. Due to him being in the army, he gets a 2nd chance at existence in a fantasy VR game called Adonis Rebirth. There, Nathan will get to live another life, one filled with heroic quests and epic adventures. A land packed with legend and glory, where anyone can be a hero. But there’s a problem with his transition into the game. His consciousness isn’t loaded into a player character, but instead is transplanted into a beast who lives in the bowels of a mountain. Even worse, he finds out he is the end monster in a new limited-edition quest, where the 1st to complete it wins a unique prize. Soon, hero players are going to come and kill him. He needs to find a way to survive the hero onslaught, all the while trying to discover how to reverse what happened to him. He needs allies, but it’s hard to make them when you look like Nosferatu's ugly brother. Nathan will have to master his skills and learn how to play as the monster - his 2nd life depends on it.
Candy Sass
Elianne Adams - 2017
Get to Dexter, retrieve an external hard drive, and deliver it to the people who hired her. But there’s a vampire on her tail that wants nothing more than to suck her dry and steal her prize away from her before she can her hands on it. When she roars into Niko Garcia’s garage, she discovers more than the tracker who’s been hired to help her. She finds a wolf shifter—one who claims she’s his mate. Now she has to decide if she’s ready for the kind of forever life as a shifter’s mate entails.
Graph Theory With Applications To Engineering And Computer Science
Narsingh Deo - 2004
GRAPH THEORY WITH APPLICATIONS TO ENGINEERING AND COMPUTER SCIENCE-PHI-DEO, NARSINGH-1979-EDN-1
Introduction to Artificial Intelligence and Expert Systems
Dan W. Patterson - 1990
Coding Freedom: The Ethics and Aesthetics of Hacking
Gabriella Coleman - 2012
In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property.E. Gabriella Coleman tracks the ways in which hackers collaborate and examines passionate manifestos, hacker humor, free software project governance, and festive hacker conferences. Looking at the ways that hackers sustain their productive freedom, Coleman shows that these activists, driven by a commitment to their work, reformulate key ideals including free speech, transparency, and meritocracy, and refuse restrictive intellectual protections. Coleman demonstrates how hacking, so often marginalized or misunderstood, sheds light on the continuing relevance of liberalism in online collaboration.