Digital Communications
John G. Proakis - 1983
Includes expert coverage of new topics: Turbocodes, Turboequalization, Antenna Arrays, Digital Cellular Systems, and Iterative Detection. Convenient, sequential organization begins with a look at the historyo and classification of channel models and builds from there.
Young People, Ethics, and the New Digital Media: A Synthesis from the Good Play Project
Carrie James - 2009
This report, part of the GoodPlay Project, undertaken by researchers at Harvard Graduate School of Education's Project Zero, investigates the ethical fault lines of such digital pursuits. The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media. The authors propose a model of "good play" that involves the unique affordances of the new digital media; related technical and new media literacies; cognitive and moral development and values; online and offline peer culture; and ethical supports, including the absence or presence of adult mentors and relevant educational curricula. This proposed model for ethical play sets the stage for the next part of the GoodPlay project, an empirical study that will invite young people to share their stories of engagement with the new digital media.The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning
Easy Peasy Chinese: Mandarin Chinese for Beginners
Elinor Greenwood - 2007
Give yourself a Chinese name, see how to haggle in the shops and test yourself to see if you know the key characters.
The Calm Birth School: The Practical Guide For Modern Mamas to Create a Calm, Positive Hypnobirth
Suzy Ashworth - 2016
The Calm Birth School teaches and supports modern women (and their families) how to create calm and positive birth experiences that make them want to shout from the rooftops for all the right reasons. This comprehensive how-to guide will teach you all you need to know about hypnobirthing without morphing you into a new-age hipster. You’ll learn: The science and psychology behind why you don’t have to give birth in agony. How to work with your body and breath, defying the birthing horror stories you’ve heard and allowing your body to do what it was designed to do. A total mindset overhaul that will not only create a calm, positive birth but which will also empower you in every area of your life.Breathing techniques to enable you to deal with any stressful situation calmly and effectively: before and during birth, and beyond.Exactly what you need to do to enjoy every step of your pregnancy and birth, whether things go according to plan or not.So if you are a control freak; if you’re scared out of your mind about giving birth; if you believe in your body but do not want to waft a joss stick around your lady parts… This book is for you. With lots of juicy bonuses like birth preferences planners, a confidence building Mp3, practice schedule and lots more included you'll have everything you need to create the positive birth experience you deserve. Suzy Ashworth is a pregnancy coach, hypnotherapist and psychotherapist with two children and a growing bump. She has a passion for showing women exactly why they can and should believe in themselves, empowering them to create mind-blowing birth experiences.
Abstract Algebra
I.N. Herstein - 1986
Providing a concise introduction to abstract algebra, this work unfolds some of the fundamental systems with the aim of reaching applicable, significant results.
Never surrender : lost voices of a generation at war
Robert Kershaw - 2009
Beginning with first-hand accounts of the reaction to Chamberlain's declaration of war in 1939, Kershaw portrays the many aspects of war through the words of those who were there, from the sailors of the little ships of Dunkirk to German soldiers preparing for Operation 'Sea Lion'. He takes us from the nightly horrors of the Blitz to battles in the limitless desert of North Africa, and from jungle war in Burma to Lancaster bombers over Germany and the beaches of Normandy. Featuring new interviews with veterans and civilians from Britain, the Commonwealth and Germany as well as diaries, letters, and first-hand accounts, this is a testimony to the remarkable men and women who lived through the Second World War -- whose refusal to surrender changed them, and Britain, forever.
UNIX Power Tools
Jerry Peek - 1993
It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities.Loaded with even more practical advice about almost every aspect of UNIX, this edition addresses the technology that UNIX users face today, differing from the first edition in a number of important ways.First, it slants the blend of options and commands more toward the POSIX utilities, including the GNU versions; the bash and tcsh shells have greater coverage, but we've kept the first edition's emphasis on the core concepts of sh and csh that will help you use all UNIX shells; and, Perl is more important than awk these days, so we've de-emphasized awk in this edition.This is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. The book is structured so that it bursts at the seams with cross references. Interesting "sidebars" explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. You'll find articles abstracted from other O'Reilly books, new information that highlights program "tricks" and "gotchas," tips posted to the Net over the years, and other accumulated wisdom.The 53 chapters in this book discuss topics like file management, text editors, shell programming -- even office automation. Overall, there's plenty of material here to satisfy even the most voracious appetites. The bottom line? UNIX Power Tools is loaded with practical advice about almost every aspect of UNIX. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.The CD-ROM includes all of the scripts and aliases from the book, plus perl, GNU emacs, netpbm (graphics manipulation utilities), ispell,screen, the sc spreadsheet, and about 60 other freeware programs. In addition to the source code, all the software is precompiled for Sun4, Digital UNIX, IBM AIX, HP/UX, Red Hat Linux, Solaris, and SCO UNIX.
WPF 4 Unleashed
Adam Nathan - 2010
Windows Presentation Foundation (WPF) is the recommended technology for creating Windows user interfaces, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, multi-touch, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. WPF 4 Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by WPF guru and Microsoft developer Adam Nathan. Covers everything you need to know about Extensible Application Markup Language (XAML) Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more Highlights the latest features, such as multi-touch, text rendering improvements, XAML language enhancements, new controls, the Visual State Manager, easing functions, and much more Delves into topics that aren't covered by most books: 3D, speech, audio/video, documents, effects Shows how to create popular UI elements, such as Galleries, ScreenTips, and more Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes Explains how to create first-class custom controls for WPF Demonstrates how to create hybrid WPF software that leverages Windows Forms, DirectX, ActiveX, or other non-WPF technologies Explains how to exploit new Windows 7 features, such as Jump Lists and taskbar customizations
Artificial Intelligence: Structures and Strategies for Complex Problem Solving
George F. Luger - 1997
It is suitable for a one or two semester university course on AI, as well as for researchers in the field.
Educational Psychology: Windows on Classrooms
Paul D. Eggen - 1992
Long recognized as very applied and practical, Eggen and Kauchak's Educational Psychology: Windows on Classrooms, seventh edition is now even more applied and concise, giving students exactly what they need to know in the course. The author's hallmark cases remain, in both written and videotape format, to introduce real-world applications in a way that no other text can. Along with expanded applications to diversity (urban, suburban, and rural areas), technology, and a new pedagogical system that completely restructures how information is delivered in the book and will help students really understand what they should be getting out of every single chapter. The text now comes with two new DVDs of video material and an access code for the new Teacher Prep Website that will be automatically shrinkwrapped with all new copies of the text. Educational Psychology: Windows on Classrooms once again truly fulfills the promise of its title, giving students a window on the classrooms in which they will someday teach.
Think Python
Allen B. Downey - 2002
It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.
Unauthorised Access: Physical Penetration Testing for IT Security Teams
Wil Allsopp - 2009
IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
Modernist Cooking Made Easy: Sous Vide: The Authoritative Guide to Low Temperature Precision Cooking
Jason Logsdon - 2014
Most importantly it will allow you to significantly increase the quality and consistency of the dishes you create on a daily basis. And for those of you whose lives are harried, the sous vide technique also allows you to create remarkable meals while working around your hectic schedule.Modernist Cooking Made Easy: Sous Vide is the authoritative guide to low temperature precision cooking and it will help make sous vide a part of your everyday cooking arsenal.Sous vide is a simple an extremely effective way to cook. This book covers every step of the sous vide process, from seasoning, sealing, and temperature control to how to determine the times and temperatures needed to turn out great food. There are also extensive write ups for the main types of food including steak and red meat, pork, fish and shellfish, eggs, fruits and vegetables, and much more.What You Get In This Book:•The bulk of this book is the more than 85 recipes it contains. Designed so you can skim the recipes, looking for something that inspires you, or turn to a specific recipe to learn all about how to cook the cut of meat it features.•A detailed look at the entire sous vide process, including pre-sous vide preparation, sous vide sealing, temperature control, determining time and temperatures, and finishing sous vided foods.•More than 85 recipes providing a wide variety of dishes across many cuts of meat and types of vegetables. They include:•Beef, Lamb, and Other Red Meat•Pork•Sausage and Ground Meats•Chicken, Turkey, Duck, and Poultry•Eggs•Fish and Shellfish•Fruits and Vegetables•Infusions of Alcohol, Oil, and Vinegar•Sweet and Sours such as yogurt, creme brulee, and dulce de leche•An introduction to the equipment you will need for cooking sous vide. From a simple no-cost method that will allow you to give sous vide cooking a try, to a low-cost setup that will meet all of your sous vide cooking needs.•A comprehensive sous vide time and temperature chart, as well as cooking-by-thickness times.•More than 35 "Modernist Notes" with suggestions for using modernist ingredients and techniques to turn everyday meals into upscale and elegant dishes.If you want to use sous vide to prepare amazing food simply and easily then this is the book for you!
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Learn Ruby the Hard Way
Zed A. Shaw - 2011
It assumes absolutely no prior programming knowledge and will guide you carefully and slowly through the learning process.Learn Ruby The Hard Way is a translation of the original "Learn Python The Hard Way" to teaching Ruby, with the translation done by Rob Sobers. "Learn Python The Hard Way" has taught hundreds of thousands worldwide how to code in Python, and this book uses the same proven method for Ruby. When you are done with this book you will have the skill to move on to other books about Ruby and be ready to understand them.