Book picks similar to
Fundamentals of Electrical Engineering by Leonard S. Bobrow
electrical-engineering
engineering
reference
arizona-cardinals
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Computer Science: An Overview
J. Glenn Brookshear - 1985
This bookpresents an introductory survey of computer science. It explores thebreadth of the subject while including enough depth to convey anhonest appreciation for the topics involved. The new edition includesreorganization of some key material for enhanced clarity (SoftwareEngineering and Artificial Intelligence chapters), new and expandedmaterial on Security and Data Abstractions, more on ethics anddifferent ethical theories in Chapter 0. Anyone interested in gaining athorough introduction to Computer Science.
Deep Learning
Ian Goodfellow - 2016
Because the computer gathers knowledge from experience, there is no need for a human computer operator to formally specify all the knowledge that the computer needs. The hierarchy of concepts allows the computer to learn complicated concepts by building them out of simpler ones; a graph of these hierarchies would be many layers deep. This book introduces a broad range of topics in deep learning.The text offers mathematical and conceptual background, covering relevant concepts in linear algebra, probability theory and information theory, numerical computation, and machine learning. It describes deep learning techniques used by practitioners in industry, including deep feedforward networks, regularization, optimization algorithms, convolutional networks, sequence modeling, and practical methodology; and it surveys such applications as natural language processing, speech recognition, computer vision, online recommendation systems, bioinformatics, and videogames. Finally, the book offers research perspectives, covering such theoretical topics as linear factor models, autoencoders, representation learning, structured probabilistic models, Monte Carlo methods, the partition function, approximate inference, and deep generative models.Deep Learning can be used by undergraduate or graduate students planning careers in either industry or research, and by software engineers who want to begin using deep learning in their products or platforms. A website offers supplementary material for both readers and instructors.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
How to Ace Calculus: The Streetwise Guide
Colin Conrad Adams - 1998
Capturing the tone of students exchanging ideas among themselves, this unique guide also explains how calculus is taught, how to get the best teachers, what to study, and what is likely to be on exams—all the tricks of the trade that will make learning the material of first-semester calculus a piece of cake. Funny, irreverent, and flexible, How to Ace Calculus shows why learning calculus can be not only a mind-expanding experience but also fantastic fun.
The Knowledge: How to Rebuild Our World from Scratch
Lewis Dartnell - 2014
It has built on itself for centuries, becoming vast and increasingly specialized. Most of us are ignorant about the fundamental principles of the civilization that supports us, happily utilizing the latest—or even the most basic—technology without having the slightest idea of why it works or how it came to be. If you had to go back to absolute basics, like some sort of postcataclysmic Robinson Crusoe, would you know how to re-create an internal combustion engine, put together a microscope, get metals out of rock, accurately tell time, weave fibers into clothing, or even how to produce food for yourself? Regarded as one of the brightest young scientists of his generation, Lewis Dartnell proposes that the key to preserving civilization in an apocalyptic scenario is to provide a quickstart guide, adapted to cataclysmic circumstances. The Knowledge describes many of the modern technologies we employ, but first it explains the fundamentals upon which they are built. Every piece of technology rests on an enormous support network of other technologies, all interlinked and mutually dependent. You can’t hope to build a radio, for example, without understanding how to acquire the raw materials it requires, as well as generate the electricity needed to run it. But Dartnell doesn’t just provide specific information for starting over; he also reveals the greatest invention of them all—the phenomenal knowledge-generating machine that is the scientific method itself. This would allow survivors to learn technological advances not explicitly explored in The Knowledge as well as things we have yet to discover. The Knowledge is a brilliantly original guide to the fundamentals of science and how it built our modern world as well as a thought experiment about the very idea of scientific knowledge itself.
Artificial Intelligence: A Modern Approach
Stuart Russell - 1994
The long-anticipated revision of this best-selling text offers the most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence. *NEW-Nontechnical learning material-Accompanies each part of the book. *NEW-The Internet as a sample application for intelligent systems-Added in several places including logical agents, planning, and natural language. *NEW-Increased coverage of material - Includes expanded coverage of: default reasoning and truth maintenance systems, including multi-agent/distributed AI and game theory; probabilistic approaches to learning including EM; more detailed descriptions of probabilistic inference algorithms. *NEW-Updated and expanded exercises-75% of the exercises are revised, with 100 new exercises. *NEW-On-line Java software. *Makes it easy for students to do projects on the web using intelligent agents. *A unified, agent-based approach to AI-Organizes the material around the task of building intelligent agents. *Comprehensive, up-to-date coverage-Includes a unified view of the field organized around the rational decision making pa
C++ Programming: From Problem Analysis to Program Design
D.S. Malik - 2002
Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach introductory programming concepts. This third edition has been enhanced to further demonstrate the use of OOD methodology, to introduce sorting algorithms (bubble sort and insertion sort), and to present additional material on abstract classes. In addition, the exercise sets at the end of each chapter have been expanded, and now contain several calculus and engineering-related exercises. Finally, all programs have been written, compiled, and quality-assurance tested with Microsoft Visual C++ .NET, available as an optional compiler with this text.
Arrl Antenna Book: The Ultimate Reference for Amateur Radio Antennas
R. Dean Straw - 1936
The CD-ROM also includes three updated and improved programs (for Windows): YW--Yagi for Windows TLW--Transmission Line for WindowsHFTA--HF Terrain AssessmentEZNEC ARRL--Antenna Modeling by W7EL
Studying Engineering: A Roadmap to a Rewarding Career
Raymond B. Landis - 1995
Independent of the class however, this book is great!I dropped out of highschool, got my GED, went to community college, dropped out of that, and now 8 years later am going to university; this time, I am committed. Whether you are a drop-out or a high-school graduate, this book will teach you new things. Not only new things, but very important things. If you want to succeed in school, not just barely make it, this book will be incredibly helpful if you take it to heart.Bottom line: I plan on keeping this book long after the class is done. Good luck and stay motivated!
MongoDB: The Definitive Guide
Kristina Chodorow - 2010
Learn how easy it is to handle data as self-contained JSON-style documents, rather than as records in a relational database.Explore ways that document-oriented storage will work for your projectLearn how MongoDB’s schema-free data model handles documents, collections, and multiple databasesExecute basic write operations, and create complex queries to find data with any criteriaUse indexes, aggregation tools, and other advanced query techniquesLearn about monitoring, security and authentication, backup and repair, and moreSet up master-slave and automatic failover replication in MongoDBUse sharding to scale MongoDB horizontally, and learn how it impacts applicationsGet example applications written in Java, PHP, Python, and Ruby
Think Python
Allen B. Downey - 2002
It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.
Electronic Communications System: Fundamentals Through Advanced
Wayne Tomasi - 1987
Comprehensive in scope and contemporary in coverage, this text introduces basic electronic and data communications fundamentals and explores their application.
UNIX in a Nutshell: A Desktop Quick Reference - Covers GNU/Linux, Mac OS X, and Solaris
Arnold Robbins - 1999
As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac OS X and more varieties of Linux than you can easily name.The latest edition of this bestselling reference brings Unix into the 21st century. It's been reworked to keep current with the broader state of Unix in today's world and highlight the strengths of this operating system in all its various flavors. Detailing all Unix commands and options, the informative guide provides generous descriptions and examples that put those commands in context. Here are some of the new features you'll find in Unix in a Nutshell, Fourth Edition:Solaris 10, the latest version of the SVR4-based operating system, GNU/Linux, and Mac OS X Bash shell (along with the 1988 and 1993 versions of ksh) tsch shell (instead of the original Berkeley csh) Package management programs, used for program installation on popular GNU/Linux systems, Solaris and Mac OS X GNU Emacs Version 21 Introduction to source code management systems Concurrent versions system Subversion version control system GDB debuggerAs Unix has progressed, certain commands that were once critical have fallen into disuse. To that end, the book has also dropped material that is no longer relevant, keeping it taut and current.If you're a Unix user or programmer, you'll recognize the value of this complete, up-to-date Unix reference. With chapter overviews, specific examples, and detailed command.