Data Structures Using C++


D.S. Malik - 2003
    D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.

The Power Formula for LinkedIn Success: Kick-start Your Business, Brand, and Job Search


Wayne Breitbarth - 2011
    You have already done a lot of the networking groundwork, and LinkedIn can extend your reach even further with minimal time each week.Using actual screenshots of the LinkedIn website, Breitbarth demonstrates how you can take advantage of all the features of this professional networking platform. He shows you how to create a compelling profile, use keywords to improve your ability to find and be found by others, build a solid base of connections, solicit valuable recommendations, and much more. His 6-week, 2-hour-per-week startup plan and weekly maintenance plan will motivate you to make the most of your time on LinkedIn.Wayne Breitbarth’s pragmatic teaching style and engaging sense of humor are on display throughout The Power Formula for LinkedIn Success, and he shares many specific examples, stories, and illustrations that are the direct result of thirty years’ experience in business consulting and business ownership. Whether you are an entry-level professional, a CEO, or anywhere in between, you can benefit from this practical introduction to a powerful networking tool.

Introduction to Computer Theory


Daniel I.A. Cohen - 1986
    Covers all the topics needed by computer scientists with a sometimes humorous approach that reviewers found refreshing. The goal of the book is to provide a firm understanding of the principles and the big picture of where computer theory fits into the field.

The Best of 2600: A Hacker Odyssey


Emmanuel Goldstein - 2008
    Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

A Byte of Python


Swaroop C.H. - 2004
    An introduction to Python programming for beginners.

The Chemist's Shop


Richard Brumer - 2015
    He puts the horrific tragedies of his past behind him and finds serenity in his new life. That is, until he recognizes a customer as former Nazi SS officer, Hans Stern.Michael looks into Stern’s cold steel-blue eyes, clenches his fists and boils inside, remembering how his three young daughters were taken from him and gassed, and his wife, Ilona, was tortured, raped and stripped of all dignity by Stern twenty-five years earlier in Auschwitz.Face to face with this evil being, Michael forces himself to stay calm. In that moment, he experiences two opposing but related feelings. One is anger, the other exhilaration.He could not protect his family then, but he can avenge their deaths now. It wasn’t just about killing Stern. That would be too easy. His death had to be slow, painful, and diabolical, and it begins with a game of chess.

The Technological Singularity


Murray Shanahan - 2015
    Some singularity theorists predict that if the field of artificial intelligence (AI) continues to develop at its current dizzying rate, the singularity could come about in the middle of the present century. Murray Shanahan offers an introduction to the idea of the singularity and considers the ramifications of such a potentially seismic event. Shanahan's aim is not to make predictions but rather to investigate a range of scenarios. Whether we believe that singularity is near or far, likely or impossible, apocalypse or utopia, the very idea raises crucial philosophical and pragmatic questions, forcing us to think seriously about what we want as a species. Shanahan describes technological advances in AI, both biologically inspired and engineered from scratch. Once human-level AI -- theoretically possible, but difficult to accomplish -- has been achieved, he explains, the transition to superintelligent AI could be very rapid. Shanahan considers what the existence of superintelligent machines could mean for such matters as personhood, responsibility, rights, and identity. Some superhuman AI agents might be created to benefit humankind; some might go rogue. (Is Siri the template, or HAL?) The singularity presents both an existential threat to humanity and an existential opportunity for humanity to transcend its limitations. Shanahan makes it clear that we need to imagine both possibilities if we want to bring about the better outcome.

Introduction to Physical Metallurgy


Sidney H. Avner - 1974
    The main ideas and applications of the metallurgy are provided in this book.

Infinite Reality: Avatars, Eternal Life, New Worlds, and the Dawn of the Virtual Revolution


Jim Blascovich - 2011
    Infinite Reality is the straight dope on what is and isn’t happening to us right now, from two of the only scientists working on the boundaries between real life and its virtual extensions.”—Douglas Rushkoff, author of Program or Be ProgrammedHow achievable are the virtual experiences seen in The Matrix, Tron, and James Cameron’s Avatar? Do our brains know where “reality” ends and “virtual” begins? In Infinite Reality, Jim Blascovich and Jeremy Bailenson, two pioneering experts in the field of virtual reality, reveal how the human brain behaves in virtual environments and examine where radical new developments in digital technology will lead us in five, fifty, and five hundred years.

R for Dummies


Joris Meys - 2012
    R is packed with powerful programming capabilities, but learning to use R in the real world can be overwhelming for even the most seasoned statisticians. This easy-to-follow guide explains how to use R for data processing and statistical analysis, and then, shows you how to present your data using compelling and informative graphics. You'll gain practical experience using R in a variety of settings and delve deeper into R's feature-rich toolset.Includes tips for the initial installation of RDemonstrates how to easily perform calculations on vectors, arrays, and lists of dataShows how to effectively visualize data using R's powerful graphics packagesGives pointers on how to find, install, and use add-on packages created by the R communityProvides tips on getting additional help from R mailing lists and websitesWhether you're just starting out with statistical analysis or are a procedural programming pro, "R For Dummies" is the book you need to get the most out of R.

Mac OS X Internals: A Systems Approach


Amit Singh - 2006
    Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.

The Hacker Playbook: Practical Guide To Penetration Testing


Peter Kim - 2014
    The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Make Noise: A Creator's Guide to Podcasting and Great Audio Storytelling


Eric Nuzum - 2019
      Nuzum identifies core principles, including what he considers the key to successful audio storytelling: learning to think the way your audience listens. He delivers essential how-tos, from conducting an effective interview to marketing your podcast, developing your audience, and managing a creative team. He also taps into his deep network to offer advice from audio stars like Ira Glass, Terry Gross, and Anna Sale.   The book’s insights and guidance will help readers successfully express themselves as effective audio storytellers, whether for business or pleasure, or a mixture of both.

SQL for Dummies


Allen G. Taylor - 1997
    Get an insider's tour of databases and client-server systems so you can understand the local customs. Then work your way up to sophisticated commands and statements, and check out the coverage of SQL-related products, such as Microsoft SQL server. You'll be able to communicate with your database like a native speaker in no time! Inside, find helpful advice on how to Get a complete overview of SQL components, such as Data Definition Language, Data Manipulation Language, and Data Control Language Use SQL to transfer and retrieve information on the Internet and intranets Uncover fundamental SQL commands and data types Extract data from many different data sources by using ODBC Master the basics of creating tables, views, schemas, and indexes for easy data access Manage databases by using SQL server Access a database over the Internet Get tips for making advanced queries

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.