Information Theory, Inference and Learning Algorithms


David J.C. MacKay - 2002
    These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Build-a-Bowl: 77 Satisfying Nutritious Combos: Whole Grain + Vegetable + Protein + Sauce = Meal


Nicki Sizemore - 2018
    Add a layer of fresh vegetables and herbs, follow that with a lean protein, and then finish it off with a flavorful sauce for a delectable super-powered meal.  Sizemore’s 77 creative combinations range from the Chicken Sausage Meatballs Bowl to the Crispy Fish Taco Bowl and the vegan-friendly Double Broccoli Power Bowl. Suitable for breakfast, lunch, or dinner, the beauty of the bowl is that every combination can be customized, making it a perfect solution for feeding everyone at the table with their favorites — happily and easily.

Professor Frisby's Mostly Adequate Guide to Functional Programming


Brian Lonsdorf
    We'll use the world's most popular functional programming language: JavaScript. Some may feel this is a poor choice as it's against the grain of the current culture which, at the moment, feels predominately imperative. However, I believe it is the best way to learn FP for several reasons:You likely use it every day at work.This makes it possible to practice and apply your acquired knowledge each day on real world programs rather than pet projects on nights and weekends in an esoteric FP language.We don't have to learn everything up front to start writing programs.In a pure functional language, you cannot log a variable or read a DOM node without using monads. Here we can cheat a little as we learn to purify our codebase. It's also easier to get started in this language since it's mixed paradigm and you can fall back on your current practices while there are gaps in your knowledge.The language is fully capable of writing top notch functional code.We have all the features we need to mimic a language like Scala or Haskell with the help of a tiny library or two. Object-oriented programming currently dominates the industry, but it's clearly awkward in JavaScript. It's akin to camping off of a highway or tap dancing in galoshes. We have to bind all over the place lest this change out from under us, we don't have classes[^Yet], we have various work arounds for the quirky behavior when the new keyword is forgotten, private members are only available via closures. To a lot of us, FP feels more natural anyways.That said, typed functional languages will, without a doubt, be the best place to code in the style presented by this book. JavaScript will be our means of learning a paradigm, where you apply it is up to you. Luckily, the interfaces are mathematical and, as such, ubiquitous. You'll find yourself at home with swiftz, scalaz, haskell, purescript, and other mathematically inclined environments.

Gaslighting: The Narcissist's favorite tool of Manipulation - How to avoid the Gaslight Effect and Recovery from Emotional and Narcissistic Abuse


Theresa J. Covert - 2019
    The Gaslight Effect is not officially recognised, nor is it widely even known.Even when it is accepted, recognised and known not many people seem to know what to DO ABOUT IT to heal it… The fact is being in a relationship with a narcissist over a long period of time has long lasting traumatic effects that can be extremely catastrophic to the person suffering them.DO THE FOLLOWING SYMPTOMS SOUND FAMILIAR?- Doubting yourself and your sanity- Feeling like you’re losing your mind- Feeling like you’re always apologizing- You’re second-guessing your memory- Feeling like you aren’t good enough- Feeling misunderstood- Feeling lonely- Ruined self confidence- Extreme weight loss or weight gain- Uncharacteristic jealousy/ insecurity- Feeling like you don’t know the difference between right and wrong- Extreme paranoia (being turned into an obsessive detective)- Endless, repetitive obsessive thinking about your ex- Constantly trying to find explanations for what has happened- Feelings of helplessness and despair- A desire to self isolate- Feeling desperately misunderstood- Overwhelming feelings of loss and grief- Extreme bouts of rage- An inability to be comfortable with yourself- Strange dreams- Sudden inexplicable anxiety followed by rapid dips into depressionThe list goes on….“NOBODY UNDERSTANDS!”I hear this frustrated cry from abused people a lot.Gaslighting is a covert aggressive way of distorting another person’s perception of reality to the point that that person questions their sanity or their memory.Gaslighting is crazy-making, it makes you think that you’re actually going crazy.Gaslighting is a way of hiding the abuse.Gaslighting is lying with a goal.The motive behind the gaslighting is to make you think that you’re crazy or that your memory doesn’t work right. So you can’t trust yourself and your perceptions of reality.This means you’ll defer to the abuser for an account of what’s real so slowly over time the abuser becomes the authority over your life.Gaslighting takes place in relationships, like one-on-one relationships. It takes place in friendships, in family, in work, you’ll see gaslighting on the news, you’ll hear gaslighting coming from politicians, corporate shills, cult leaders, advertising commercials, etc.WHAT YOU WILL LEARN:- Top 10 Signs You're Being Manipulated with Gaslighting- 80 Things Narcissists Say During Gaslighting- Six Empowering Ways to Disarm a Narcissist and Take Control- How to Avoid Mental Manipulation- How to Deal with the Effects of Gaslighting- How Narcissists Employ Smart Devices        WHAT YOU NEED NOW:- Someone who has been through the same experiences you have and understands them from the inside.-Someone who has the knowledge, training, education and experience working on himself and others to lead you through the emotional sh*tstorm that breaking with a narcissist can create.

The Architecture of Open Source Applications


Amy Brown - 2011
    In contrast, most software developers only ever get to know a handful of large programs well—usually programs they wrote themselves—and never study the great programs of history. As a result, they repeat one another's mistakes rather than building on one another's successes.This book's goal is to change that. In it, the authors of twenty-five open source applications explain how their software is structured, and why. What are each program's major components? How do they interact? And what did their builders learn during their development? In answering these questions, the contributors to this book provide unique insights into how they think.If you are a junior developer, and want to learn how your more experienced colleagues think, this book is the place to start. If you are an intermediate or senior developer, and want to see how your peers have solved hard design problems, this book can help you too.

Elixir in Action


Saša Jurić - 2015
    Revised and updated for the Elixir 1.7, Elixir in Action, Second Edition teaches you how to apply Elixir to practical problems associated with scalability, fault tolerance, and high availability. Along the way, you'll develop an appreciation for, and considerable skill in, a functional and concurrent style of programming.

Understanding Computation: From Simple Machines to Impossible Programs


Tom Stuart - 2013
    Understanding Computation explains theoretical computer science in a context you’ll recognize, helping you appreciate why these ideas matter and how they can inform your day-to-day programming.Rather than use mathematical notation or an unfamiliar academic programming language like Haskell or Lisp, this book uses Ruby in a reductionist manner to present formal semantics, automata theory, and functional programming with the lambda calculus. It’s ideal for programmers versed in modern languages, with little or no formal training in computer science.* Understand fundamental computing concepts, such as Turing completeness in languages* Discover how programs use dynamic semantics to communicate ideas to machines* Explore what a computer can do when reduced to its bare essentials* Learn how universal Turing machines led to today’s general-purpose computers* Perform complex calculations, using simple languages and cellular automata* Determine which programming language features are essential for computation* Examine how halting and self-referencing make some computing problems unsolvable* Analyze programs by using abstract interpretation and type systems

High Performance: Lessons from the Best on Becoming Your Best


Jake Humphrey - 2021
    And in his multi-million download podcast, High Performance, he teams up with Professor Damian Hughes to examine the secrets of the world's highest-performing people.Now, Jake and Damian reveal how we can all become high performers. Drawing on interviews with leading sportspeople and entrepreneurs, they uncover the eight hidden principles that drive high performers to success: from taking absolute responsibility for their situation, to working out their non-negotiable 'trademark behaviours', to getting the very best out of their teammates. And they draw on cutting-edge psychology to reveal how to apply these principles in our day-to-day lives - whether on the pitch, in our careers, or at home.You too can harness the secrets of high performance. This book explains how.Drawing on interviews with: Ben Ainslie | Steven Bartlett | Lily Cole | Tom Daley | Rio Ferdinand | Steven Gerrard | Kelly Holmes | Steph Houghton | Chris Hoy | Eddie Jones | Kelly Jones | Siya Kolisi | Frank Lampard | Jo Malone | Matthew McConaughey | Ant Middleton | Tracey Neville | Phil Neville | Robin Van Persie | Nims Purja | Mauricio Pochettino | Jonny Wilkinson | Clive Woodward | and many more . . .

Captivate: Conversational Secrets To Be Instantly Likeable, Make Unforgettable Impressions, And Never Run Out Of Things To Say


Charlie Houpert - 2014
     Think back to the job interview you nailed (or blew). The date that went perfectly (or broke down completely.) Or the random encounter with that person who turned out to be your best friend (or the countless others that didn’t). Mere seconds of conversation have the power to alter the course of your life. It’s miraculous then that we are never taught HOW to conduct conversations. How to navigate them so that we get more of the jobs, dates, and best friends we want. It’s as if the world believes amazing conversational skills can’t be learned. Captivate shatters that belief. Inside you'll learn: How to keep conversations going without running out of things to say and facing the dreaded awkward silence How to create interesting "getting to know you" conversations without slipping into boring interview mode and turning off who you're talking to How to start conversations with strangers and approach people you don't know Real life examples of great (and terrible) conversations The two modes of conversation that allow you to connect with anyone, even when you don't have anything in common How to finish a conversation so people walk away planning on reaching out to you Read Captivate and you’ll learn how to have conversations that stand out in people’s minds and make you someone they never want to forget.

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Justin Seitz - 2008
    But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

Lessons From the Edge: Inspirational Tales of Surviving, Thriving and Extreme Adventure


Aldo Kane - 2021
    

Machine Learning for Dummies


John Paul Mueller - 2016
    Without machine learning, fraud detection, web search results, real-time ads on web pages, credit scoring, automation, and email spam filtering wouldn't be possible, and this is only showcasing just a few of its capabilities. Written by two data science experts, Machine Learning For Dummies offers a much-needed entry point for anyone looking to use machine learning to accomplish practical tasks.Covering the entry-level topics needed to get you familiar with the basic concepts of machine learning, this guide quickly helps you make sense of the programming languages and tools you need to turn machine learning-based tasks into a reality. Whether you're maddened by the math behind machine learning, apprehensive about AI, perplexed by preprocessing data--or anything in between--this guide makes it easier to understand and implement machine learning seamlessly.Grasp how day-to-day activities are powered by machine learning Learn to 'speak' certain languages, such as Python and R, to teach machines to perform pattern-oriented tasks and data analysis Learn to code in R using R Studio Find out how to code in Python using Anaconda Dive into this complete beginner's guide so you are armed with all you need to know about machine learning!

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.