Book picks similar to
Gardens of Imagination/Programming 3d Maze Games in C/C++ by Christopher F. Lampton
c
c-cpp-language
classic-computing
computer
Homeland Insecurity: The Onion Complete News Archives, Volume 17
The Onion - 2006
Homeland Insecurity is Volume 17 in the always bestselling and always entertaining Onion series.The Onion is the world’s most popular humor publication, with more than 3.8 million weekly visitors to its website (theonion.com) and a print circulation of more than 500,000. More than a million copies of its various books have been sold to date, beginning with Our Dumb Century, which was a #1 New York Times bestseller and winner of the Thurber Prize for American Humor.
Groovy in Action
Dierk König - 2007
Groovy in Action is a comprehensive guide to Groovy programming, introducing Java developers to the new dynamic features that Groovy provides. To bring you Groovy in Action, Manning again went to the source by working with a team of expert authors including both members and the Manager of the Groovy Project team. The result is the true definitive guide to the new Groovy language.Groovy in Action introduces Groovy by example, presenting lots of reusable code while explaining the underlying concepts. Java developers new to Groovy find a smooth transition into the dynamic programming world. Groovy experts gain a solid reference that challenges them to explore Groovy deeply and creatively.Because Groovy is so new, most readers will be learning it from scratch. Groovy in Action quickly moves through the Groovy basics, including:Simple and collective Groovy data types Working with Closures and Groovy Control Structures Dynamic Object Orientation, Groovy styleReaders are presented with rich and detailed examples illustrating Groovy's enhancements to Java, includingHow to Work with Builders and the GDK Database programming with GroovyGroovy in Action then demonstrates how to Integrate Groovy with XML, and provides:Tips and Tricks Unit Testing and Build Support Groovy on WindowsAn additional bonus is a chapter dedicated to Grails, the Groovy Web Application Framework.Purchase of the print book comes with an offer of a free PDF eBook from Manning. Also available is all code from the book.
Cuda by Example: An Introduction to General-Purpose Gpu Programming
Jason Sanders - 2010
" From the Foreword by Jack Dongarra, University of Tennessee and Oak Ridge National Laboratory CUDA is a computing architecture designed to facilitate the development of parallel programs. In conjunction with a comprehensive software platform, the CUDA Architecture enables programmers to draw on the immense power of graphics processing units (GPUs) when building high-performance applications. GPUs, of course, have long been available for demanding graphics and game applications. CUDA now brings this valuable resource to programmers working on applications in other domains, including science, engineering, and finance. No knowledge of graphics programming is required just the ability to program in a modestly extended version of C. " CUDA by Example, " written by two senior members of the CUDA software platform team, shows programmers how to employ this new technology. The authors introduce each area of CUDA development through working examples. After a concise introduction to the CUDA platform and architecture, as well as a quick-start guide to CUDA C, the book details the techniques and trade-offs associated with each key CUDA feature. You ll discover when to use each CUDA C extension and how to write CUDA software that delivers truly outstanding performance. Major topics covered includeParallel programmingThread cooperationConstant memory and eventsTexture memoryGraphics interoperabilityAtomicsStreamsCUDA C on multiple GPUsAdvanced atomicsAdditional CUDA resources All the CUDA software tools you ll need are freely available for download from NVIDIA.http: //developer.nvidia.com/object/cuda-by-e...
Programming Entity Framework: DbContext
Julia Lerman - 2011
This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database
Understanding and Using C Pointers
Richard Reese - 2013
With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.Difficult to master, pointers provide C with much flexibility and power—yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you’re a beginner or an experienced C or C++ programmer or developer.Get an introduction to pointers, including the declaration of different pointer typesLearn about dynamic memory allocation, de-allocation, and alternative memory management techniquesUse techniques for passing or returning data to and from functionsUnderstand the fundamental aspects of arrays as they relate to pointersExplore the basics of strings and how pointers are used to support themExamine why pointers can be the source of security problems, such as buffer overflowLearn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword
Almost Eleven: The Murder of Brenda Sue Sayers
Harrell Glenn Crowson - 2013
Imperial Valley’s biggest crime is detailed through volumes of official records and interviews with witnesses, relatives and investigators.Serial killer Robert Eugene Pennington not only murdered Sayers, but was a suspect in killing Dorothy Minor-Hindman in Fresno and possibly fifteen other innocent victims from coast to coast including one victim attributed to the Boston Strangler.Extensive research provides the reader with details of Pennington’s life before and after his encounter with Brenda.
Facebook Marketing: An Hour a Day
Chris Treadaway - 2010
Its ability to target users who have provided real data about themselves and their interests makes Facebook the ideal platform for marketers, and marketers everywhere recognize the importance of Facebook and are eager to successfully tap Facebook's potential. This book shows you how.Quickly get up to speed on today's Facebook conventions and demographics, and then gain an understanding of the various strategic and implementation issues you must consider from start to finish.Guides you through crafting a successful presence on Facebook and takes you through each step for developing an overall marketing strategy Explains each step for setting realistic goals, defining metrics, developing reports, and acquiring corporate buy-in Shows how to execute your strategy while incorporating all of Facebook's relevant features Addresses Facebook's pay-per-click platform, Facebook Connect, and more Packed with tips and tactics not documented anywhere else, the book serves as the ultimate step-by-step guide to developing a winning Facebook marketing campaign.
Uncle John's Fourth Bathroom Reader (Uncle John's Bathroom Reader, #4)
Bathroom Readers' Institute - 1991
No agonizing choices between light reading and the serious stuff. This little volume has it all: Entertainment, humor, education, trivia, science, history, pop culture...and more! And it's even divided by length-you can spend a minute with the Quickies, relax with Normal-Length articles, or really get comfortable with Long Items.With Uncle John's Bathroom Reader strategically placed in your home, you'll settle in happily and read about:-The origin of common words and phrases-The 7 wonders of the ancient world-The origin of Ronald -Elvis's letter to Richard Nixon-The curse of King Tut-World-class winners & losers-Famous pirates-And a host of great bathroom topics
Love's Proof
Catherine Palmer - 2003
Tension mounts as those who touch the box suffer strange, unexplained bouts of illness. As Jane and scientist Thomas Norcross pursue the mysterious box and seek to unmask its secrets, they discover that the strongest evidence is found in the heart, where faith and love reside.
Microprocessors and Interfacing: Programming and Hardware
Douglas V. Hall - 1986
Students begin with a brief introduction to computer hardware which leads to an in-depth look at how microprocessor-based computers are programmed to do real tasks. They also cover assembly language programming of 8086-based systems. Throughout the text, the emphasis is on writing assembly language programs in a top-down, structured manner. Included are comparisons between CISC and RISC microcomputer architectures and their trade-offs. 1990 HC 000pp
Assembly Language Programming And Organization Of The Ibm Pc
Andrew B.C. Yu - 1992
This text includes coverage of I/O control, video/graphics control, text display, and OS/2. Its also illustrates examples of structured programming.
My Job Went to India
Chad Fowler - 2005
You may still be drawing a paycheck, but the job you were hired to do no longer exists. Your company has changed, the technology has changed, the economy has changed, and the ways you can add value have changed. Have you adapted to these changes? Or are you at risk?
Architect your career
Economic downturn. Job cuts. Outsourcing. The ever-changing tech landscape. The threats abound. Chad Fowler is here to offer 52 ways to keep your job, despite the vagaries of the market.It's all about making the right choices. Choosing which technologies to focus on and which business domains to master have at least as much impact on your success as your technical knowledge--don't let those choices be accidental. Chad shows you all aspects of the decision-making process so you can ensure that you're investing your time and energy in the right areas.It's all about skills. You'll develop a structured plan for keeping your skills up-to-date so that you can compete with both the growing stable of developers in so-called low-cost countries as well as your higher-priced local peers. You'll learn how to shift your skillset up the value chain, from an offshore-ready commodity to one in high demand.It's all about marketing. As with any product or service, if nobody knows what you're selling, nobody will buy. Chad shows you how to create a plan for marketing yourself both inside your company and to the industry in general.Like it or not, the IT career landscape has changed. This handbook will teach you what you need to do to avoid being left behind.
About the author
Chad Fowler has been a software developer and manager for some of the world's largest corporations. He recently lived and worked in India, setting up and leading an offshore software development center for a large multinational company.
Advanced PHP Programming
George Schlossnagle - 2004
The rapid maturation of PHP has created a skeptical population of users from more traditional enterprise languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP. While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on scaling PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.
Concurrent Programming in Java(tm): Design Principles and Pattern
Doug Lea - 1996
Thread programming enables developers to design applications that are more responsive to user demands, faster, and more easily controlled. This book offers comprehensive coverage of this vital aspect of the Java language. The book is completely up-to-date with the new thread model that is now incorporated into the most recent version of the Java Virtual Machine. All Java programmers interested in doing concurrent programming must understand these new concepts. The book approaches the topic from a design pattern point of view. It introduces and summarizes Java's concurrency support, shows readers how to initiate, control, and coordinate concurrent activities, and offers numerous recipe-like techniques for designing and implementing Java structures that solve common concurrent programming challenges. Specifically, the book presents important strategies for avoiding the inconsistencies that can crop up in multi-threaded programs, addresses the concept of liveness-how to ensure that all threads in use are kept active simultaneously, examines state-dependent action, and demonstrates effective methods for handling user requests in a multi-threaded environment.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.