How to Do Ecology: A Concise Handbook


Richard Karban - 2006
    While these are essential, many young ecologists need to figure out how to actually do research themselves. How to Do Ecology provides nuts-and-bolts advice on how to develop a successful thesis and research program. This book presents different approaches to posing testable ecological questions. In particular, it covers the uses, strengths, and limitations of manipulative experiments in ecology. It will help young ecologists consider meaningful treatments, controls, replication, independence, and randomization in experiments, as well as where to do experiments and how to organize a season of work. This book also presents strategies for analyzing natural patterns, the value of alternative hypotheses, and what to do with negative results.Science is only part of being a successful ecologist. This engagingly written book offers students advice on working with other people and navigating their way through the land mines of research. Findings that don't get communicated are of little value. How to Do Ecology suggests effective ways to communicate information in the form of journal articles, oral presentations, and posters. Finally, it outlines strategies for developing successful grant and research proposals. Numerous checklists, figures, and boxes throughout the book summarize and reinforce the main points. In short, this book makes explicit many of the unspoken assumptions behind doing good research in ecology, and provides an invaluable resource for meaningful conversations among ecologists.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

A Book on C: Programming in C


Al Kelley - 1984
    It includes a complete chapter on C++ and an overall organization designed to appeal to the many programmers who view C as a stepping stone to C++ and the object-oriented paradigm. This edition also features an increased emphasis on modules and ADTs, which are essential concepts for creating reusable code and which show how to use header files to tie together a multi-file program. computer science students.

Digital Design: Principles and Practices Package


John F. Wakerly - 1990
    Blends academic precision and practical experience in an authoritative introduction to basic principles of digital design and practical requirements. With over 30 years of experience in both industrial and university settings, the author covers the most widespread logic design practices while building a solid foundation of theoretical and engineering principles for students to use as they go forward in this fast moving field.

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Digital Systems: Principles and Applications


Ronald J. Tocci - 1977
    KEY TOPICS For each new device or circuit, the authors describe the principle of the operation, give thorough examples, and then show its actual application. An excellent reference on modern digital systems.

Lippincott's Illustrated Reviews: Microbiology


Richard A. HarveyVictor Stollar - 2001
    The book has the hallmark features for which Lippincott's Illustrated Reviews volumes are so popular: an outline format, over 600 full-color illustrations, end-of-chapter summaries, review questions, plus an entire section of clinical case studies with full-color illustrations. This edition's medical/clinical focus has been sharpened to provide a high-yield review. Five additional case studies have been included, bringing the total to nineteen. Review questions have been reformatted to comply with USMLE Step 1 style, with clinical vignettes.

The Art and Craft of Problem Solving


Paul Zeitz - 1999
    Readers are encouraged to do math rather than just study it. The author draws upon his experience as a coach for the International Mathematics Olympiad to give students an enhanced sense of mathematics and the ability to investigate and solve problems.

Introduction to Networking: How the Internet Works


Charles Severance - 2015
     While very complex, the Internet operates on a few relatively simple concepts that anyone can understand. Networks and networked applications are embedded in our lives. Understanding how these technologies work is invaluable.  This book was written for everyone - no technical knowledge is required!While this book is not specifically about the Network+ or CCNA certifications, it as a way to give students interested in these certifications a starting point.

Marriages & Families: Changes, Choices, and Constraints


Nijole V. Benokraitis - 1993
    The text's major theme "Changes, Choices, and Constraints" explores: Contemporary "changes "in families and their structure Impacts on the "choices "that are available to family members ""Constraints ""that often limit our choices Through this approach, students are better able to understand what the research and statistics mean "for themselves"! Marriages and Families balances theoretical and empirical discussions with practical examples and applications. It highlights important contemporary changes in society and the family. This text is written from a sociological perspective and incorporates material from other disciplines: history, economics, social work, psychology, law, biology, medicine, family studies, women's studies, and anthropology. "More about the themes: " "Changes"Examines how recent profound structural and attitudinal changes affect family forms, interpersonal relationships, and raising children. It reaches beyond the traditional discussions to explore racial-ethnic families, single-parent families and gay families as well as the recent scholarship by and about men, fathers, and grandfathers. Contemporary American marriages and families vary greatly in structure, dynamics, and cultural heritage. Thus, discussions of gender roles, social class, race, ethnicity, age, and sexual orientation are integrated throughout this book. To further strengthen students understanding of the growing diversity among today's families, the author included a series of boxes that focus on families from many cultures. "Choices"On the individual level, family members have many more choices today than ever before. People feel freer to postpone marriage, to cohabit, or to raise children as single parents. As a result, household forms vary greatly, ranging from commuter marriages to those in which several generations live together under the same roof. "Constraints"Although family members choices are more varied today, we also face greater macro- level constraints. Our options are increasingly limited, for example, by government policies. Economic changes often shape family life and not vice versa. Political and legal institutions also have a major impact on most families in tax laws, welfare reform, and even in defining what a family is. Because laws, public policies, and religious groups affect our everyday lives, the author has framed many discussions of individual choices within the larger picture of the institutional constraints that limit our choices.To learn more about the new edition, click here to visit the showcase site.

Fundamentals of Biostatistics (with CD-ROM)


Bernard Rosner - 1982
    Fundamentals of Biostatistics with CD-Rom.

Python Crash Course: A Hands-On, Project-Based Introduction to Programming


Eric Matthes - 2015
    You'll also learn how to make your programs interactive and how to test your code safely before adding it to a project. In the second half of the book, you'll put your new knowledge into practice with three substantial projects: a Space Invaders-inspired arcade game, data visualizations with Python's super-handy libraries, and a simple web app you can deploy online.As you work through Python Crash Course, you'll learn how to: Use powerful Python libraries and tools, including matplotlib, NumPy, and PygalMake 2D games that respond to keypresses and mouse clicks, and that grow more difficult as the game progressesWork with data to generate interactive visualizationsCreate and customize simple web apps and deploy them safely onlineDeal with mistakes and errors so you can solve your own programming problemsIf you've been thinking seriously about digging into programming, Python Crash Course will get you up to speed and have you writing real programs fast. Why wait any longer? Start your engines and code!

Introduction to Algorithms


Thomas H. Cormen - 1989
    Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Structure and Interpretation of Computer Programs


Harold Abelson - 1984
    This long-awaited revision contains changes throughout the text. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published. A new theme has been introduced that emphasizes the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming and lazy evaluation, and nondeterministic programming. There are new example sections on higher-order procedures in graphics and on applications of stream processing in numerical programming, and many new exercises. In addition, all the programs have been reworked to run in any Scheme implementation that adheres to the IEEE standard.

The Elements of Statistical Learning: Data Mining, Inference, and Prediction


Trevor Hastie - 2001
    With it has come vast amounts of data in a variety of fields such as medicine, biology, finance, and marketing. The challenge of understanding these data has led to the development of new tools in the field of statistics, and spawned new areas such as data mining, machine learning, and bioinformatics. Many of these tools have common underpinnings but are often expressed with different terminology. This book describes the important ideas in these areas in a common conceptual framework. While the approach is statistical, the emphasis is on concepts rather than mathematics. Many examples are given, with a liberal use of color graphics. It should be a valuable resource for statisticians and anyone interested in data mining in science or industry. The book's coverage is broad, from supervised learning (prediction) to unsupervised learning. The many topics include neural networks, support vector machines, classification trees and boosting—the first comprehensive treatment of this topic in any book. Trevor Hastie, Robert Tibshirani, and Jerome Friedman are professors of statistics at Stanford University. They are prominent researchers in this area: Hastie and Tibshirani developed generalized additive models and wrote a popular book of that title. Hastie wrote much of the statistical modeling software in S-PLUS and invented principal curves and surfaces. Tibshirani proposed the Lasso and is co-author of the very successful An Introduction to the Bootstrap. Friedman is the co-inventor of many data-mining tools including CART, MARS, and projection pursuit.