Book picks similar to
Boundary-Layer Theory by Hermann Schlichting
engineering
scienza
go-theoretically
home
Algorithms
Robert Sedgewick - 1983
This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.
MLA Handbook for Writers of Research Papers
Joseph Gibaldi - 1977
For over half a century, the MLA Handbook is the guide millions of writers have relied on.The seventh edition is a comprehensive, up-to-date guide to research and writing in the online environment. It provides an authoritative update of MLA documentation style for use in student writing, including simplified guidelines for citing works published on the Web and new recommendations for citing several kinds of works, such as digital files and graphic narratives.Every copy of the seventh edition of the MLA Handbook comes with a code for accessing the accompanying Web site. New to this edition, the Web site provides- the full text of the print volume of the MLA Handbook- over two hundred additional examples- several research-project narratives--stories, with sample papers, that illustrate the steps successful students take in researching and writing papers- searching of the entire site, including the full text of the MLA Handbook- continuous access throughout the life of the seventh edition of the MLA Handbook
Code: The Hidden Language of Computer Hardware and Software
Charles Petzold - 1999
And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries. Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines. It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.
How to Hack: Hacking Secrets Exposed: A Beginner's Guide
Srikanth Ramesh - 2015
But Don't Know Where to Start..? If so, this book is specially designed for you. Hacking Secrets Exposed is an easy-to-follow, complete course on ethical hacking that takes readers right from the basics to some of the highly advanced concepts. The book starts with basic concepts like footprinting, scanning, network reconnaissance, OS fingerprinting etc. and advances to higher level concepts like password cracking, Windows hacking, network sniffing, wireless hacking, steganography, DoS, XSS, SQL injection, buffer overflow, session hijacking, email hacking and much more.Most of the popular books that are currently available in the market are suitable only for those who have a considerable amount of background knowledge in the field. Also, these books may dive too much into the theoretical part and use a lot technical jargon making it hard for beginners to follow and comprehend. However, this book will take you through the concepts of computer hacking in a very simple and easy to follow manner so that even the readers with no prior knowledge of hacking should be able to easily understand the concept. To start off, all you need is a little working knowledge of computers, operating system (Windows) and an Internet connection. Each topic in the book is presented in an extremely simple manner by including bullet points, illustrations and practical examples. The following are some of the highlighting features of the book:
Learn Hacking from the Basics.
Extremely Easy to Follow.
No Prior Knowledge of Hacking is Required.
Get Latest Hacking Techniques and Practical Examples.
So, if you are a beginner with a little or no prior background of hacking but looking to take off, Hacking Secrets Exposed is for you! We promise that you will never be disappointed by opting for this book.
Database Internals: A deep-dive into how distributed data systems work
Alex Petrov - 2019
But with so many distributed databases and tools available today, it’s often difficult to understand what each one offers and how they differ. With this practical guide, Alex Petrov guides developers through the concepts behind modern database and storage engine internals.Throughout the book, you’ll explore relevant material gleaned from numerous books, papers, blog posts, and the source code of several open source databases. These resources are listed at the end of parts one and two. You’ll discover that the most significant distinctions among many modern databases reside in subsystems that determine how storage is organized and how data is distributed.This book examines:Storage engines: Explore storage classification and taxonomy, and dive into B-Tree-based and immutable log structured storage engines, with differences and use-cases for eachDistributed systems: Learn step-by-step how nodes and processes connect and build complex communication patterns, from UDP to reliable consensus protocolsDatabase clusters: Discover how to achieve consistent models for replicated data
How to Prepare for Quantitative Aptitude for the CAT Common Admission Test
Arun Sharma - 2012
The book will also be extremely useful for those preparing for other MBA entrance examinations like XAT, SNAP, CMAT, NMAT, etc. Quantitative Aptitude is quite challenging component of the CAT question paper and the other mentioned MBA entrance examinations. In his inimitable style, Arun Sharma, an acknowledged authority on the topic, provides a comprehensive package of theory and practice problems to enable aspirants to attempt questions with extra speed and confidence.
Purely Functional Data Structures
Chris Okasaki - 1996
However, data structures for these languages do not always translate well to functional languages such as Standard ML, Haskell, or Scheme. This book describes data structures from the point of view of functional languages, with examples, and presents design techniques that allow programmers to develop their own functional data structures. The author includes both classical data structures, such as red-black trees and binomial queues, and a host of new data structures developed exclusively for functional languages. All source code is given in Standard ML and Haskell, and most of the programs are easily adaptable to other functional languages. This handy reference for professional programmers working with functional languages can also be used as a tutorial or for self-study.
Advanced Programming in the UNIX Environment
W. Richard Stevens - 1992
Rich Stevens describes more than 200 system calls and functions; since he believes the best way to learn code is to read code, a brief example accompanies each description.Building upon information presented in the first 15 chapters, the author offers chapter-long examples teaching you how to create a database library, a PostScript printer driver, a modem dialer, and a program that runs other programs under a pseudo terminal. To make your analysis and understanding of this code even easier, and to allow you to modify it, all of the code in the book is available via UUNET.A 20-page appendix provides detailed function prototypes for all the UNIX, POSIX, and ANSI C functions that are described in the book, and lists the page on which each prototype function is described in detail. Additional tables throughout the text and a thorough index make Advanced Programming in the UNIX Environment an invaluable reference tool that all UNIX programmers - beginners to experts - w
R Packages
Hadley Wickham - 2015
This practical book shows you how to bundle reusable R functions, sample data, and documentation together by applying author Hadley Wickham’s package development philosophy. In the process, you’ll work with devtools, roxygen, and testthat, a set of R packages that automate common development tasks. Devtools encapsulates best practices that Hadley has learned from years of working with this programming language.
Ideal for developers, data scientists, and programmers with various backgrounds, this book starts you with the basics and shows you how to improve your package writing over time. You’ll learn to focus on what you want your package to do, rather than think about package structure.
Learn about the most useful components of an R package, including vignettes and unit tests
Automate anything you can, taking advantage of the years of development experience embodied in devtools
Get tips on good style, such as organizing functions into files
Streamline your development process with devtools
Learn the best way to submit your package to the Comprehensive R Archive Network (CRAN)
Learn from a well-respected member of the R community who created 30 R packages, including ggplot2, dplyr, and tidyr
Essentials of Psychiatric Mental Health Nursing: Concepts of Care in Evidence-Based Practice
Mary C. Townsend - 1999
This title has a new edition: 5th Edition
Div, Grad, Curl, and All That: An Informal Text on Vector Calculus
Harry M. Schey - 1973
Since the publication of the First Edition over thirty years ago, Div, Grad, Curl, and All That has been widely renowned for its clear and concise coverage of vector calculus, helping science and engineering students gain a thorough understanding of gradient, curl, and Laplacian operators without required knowledge of advanced mathematics.
SQL and Relational Theory: How to Write Accurate SQL Code
C.J. Date - 2009
On the other hand, if you're not well versed in the theory, you can fall into several traps. In SQL and Relational Theory, author C.J. Date demonstrates how you can apply relational theory directly to your use of SQL. With numerous examples and clear explanations of the reasoning behind them, you'll learn how to deal with common SQL dilemmas, such as:Should database access granted be through views instead of base tables? Nulls in your database are causing you to get wrong answers. Why? What can you do about it? Could you write an SQL query to find employees who have never been in the same department for more than six months at a time? SQL supports "quantified comparisons," but they're better avoided. Why? How do you avoid them? Constraints are crucially important, but most SQL products don't support them properly. What can you do to resolve this situation? Database theory and practice have evolved since Edgar Codd originally defined the relational model back in 1969. Independent of any SQL products, SQL and Relational Theory draws on decades of research to present the most up-to-date treatment of the material available anywhere. Anyone with a modest to advanced background in SQL will benefit from the many insights in this book.
Fluid Mechanics
Pijush K. Kundu - 1990
New to this third edition are expanded coverage of such important topics as surface boundary interfaces, improved discussions of such physical and mathematical laws as the Law of Biot and Savart and the Euler Momentum Integral. A very important new section on Computational Fluid Dynamics has been added for the very first time to this edition. Expanded and improved end-of-chapter problems will facilitate the teaching experience for students and instrutors alike. This book remains one of the most comprehensive and useful texts on fluid mechanics available today, with applications going from engineering to geophysics, and beyond to biology and general science. * Ample, useful end-of-chapter problems.* Excellent Coverage of Computational Fluid Dynamics.* Coverage of Turbulent Flows.* Solutions Manual available.
Simulation Modeling & Analysis
Averill M. Law - 1982
The new edition includes the most up-to-date research developments and many more examples and problems.