The Unified Software Development Process


Ivar Jacobson - 1999
    This book demonstrates how the notation and process complement one another, using UML models to illustrate the new process in action. It describes the constructs such as use cases, actors, and more.

Introductory Circuit Analysis


Robert L. Boylestad - 1968
    Features exceptionally clear explanations and descriptions, step-by-step examples, more than 50 practical applications, over 2000 easy-to-challenging practice problems, and comprehensive coverage of essentials. PSpice, OrCAd version 9.2 Lite Edition, Multisims 2001 version of Electronics Workbench, and MathCad software references and examples are used throughout. Computer programs (C++, BASIC and PSpice) are printed in color, as they run, at the point in the book where they are discussed. Current and Voltage. Resistance. Ohm's Law, Power, and Energy. Series Circuits. Parallel Circuits. Series-Parallel Networks. Methods of Analysis & Selected Topics. Network Theorems. Capacitors. Magnetic Circuits. Inductors. Sinusodial Alternating Waveforms. The Basic Elements and Phasors. Series and Parallel ac Circuits. Series-Parallel ac Networks. Methods of Analysis and Related Topics. Network Theorems (ac). Power (ac). Resonance. Transformers. Polyphase Systems. Decibels, Filters, and Bode Points. Pulse Waveforms and the R-C Response. Nonsinusodial Circuits. System Analysis: An Introduction. For those working in electronic technology.

Causality: Models, Reasoning, and Inference


Judea Pearl - 2000
    It shows how causality has grown from a nebulous concept into a mathematical theory with significant applications in the fields of statistics, artificial intelligence, philosophy, cognitive science, and the health and social sciences. Pearl presents a unified account of the probabilistic, manipulative, counterfactual and structural approaches to causation, and devises simple mathematical tools for analyzing the relationships between causal connections, statistical associations, actions and observations. The book will open the way for including causal analysis in the standard curriculum of statistics, artifical intelligence, business, epidemiology, social science and economics. Students in these areas will find natural models, simple identification procedures, and precise mathematical definitions of causal concepts that traditional texts have tended to evade or make unduly complicated. This book will be of interest to professionals and students in a wide variety of fields. Anyone who wishes to elucidate meaningful relationships from data, predict effects of actions and policies, assess explanations of reported events, or form theories of causal understanding and causal speech will find this book stimulating and invaluable. Professor of Computer Science at the UCLA, Judea Pearl is the winner of the 2008 Benjamin Franklin Award in Computers and Cognitive Science.

A Mathematical Introduction to Logic


Herbert B. Enderton - 1972
    The author has made this edition more accessible to better meet the needs of today's undergraduate mathematics and philosophy students. It is intended for the reader who has not studied logic previously, but who has some experience in mathematical reasoning. Material is presented on computer science issues such as computational complexity and database queries, with additional coverage of introductory material such as sets.

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Invitation to Psychology


Carole Wade - 1998
    In clear, lively, warm prose, this edition continues the title's integration of gender, culture, and ethnicity. By the end, readers will learn how to interpret research and to address and resolve controversies. MyPsychLab is an integral part of the Wade/Tavris/Garry program. Engaging activities and assessments provide a teaching and learning system that helps students think like a psychologist. With MyPsychLab, students can watch videos on psychological research and applications, participate in virtual classic experiments, and develop critical thinking skills through writing. "Invitation to Psychology, "5/e is available in a new DSM-5 Updated edition. To learn more, click here. This title is available in a variety of formats - digital and print. Pearson offers its titles on the devices students love through Pearson's MyLab products, CourseSmart, Amazon, and more.

Head First Programming: A Learner's Guide to Programming Using the Python Language


Paul Barry - 2008
    This book offers concrete examples and exercises in the dynamic and versatile Python language to demonstrate and reinforce these concepts. Learn the basic tools to start writing the programs that interest you, and get a better understanding of what software can (and cannot) do. When you're finished, you'll have the necessary foundation to learn any programming language or tackle any software project you choose. With a focus on programming concepts, this book teaches you how to:Understand the core features of all programming languages, including: variables, statements, decisions, loops, expressions, and operatorsReuse code with functionsUse library code to save time and effortSelect the best data structure to manage complex dataWrite programs that talk to the WebShare your data with other programsWrite programs that test themselves and help you avoid embarrassing coding errors.Contents Intro xxiii1 Starting to Code: Finding Your Way2 Textual Data: Every String Has Its Place3 Functions: Let’s Get Organized4 Data Files and Arrays: Sort It Out5 Hashes and Databases: Putting Data in Its Place6 Modular Programming: Keeping Things Straight7 Building a Graphical User Interface: Going All Gooey8 GUIs and Data: Data Entry Widgets8 1/2 Exceptions and Message Boxes: Get the Message? 9 Graphical Interface Elements: Selecting the Right Tool10 Custom Widgets and Classes: With an Object in MindAppendix i Leftovers: The Top Ten Things (We Didn’t Cover)

Elementary Differential Equations


Earl D. Rainville - 1962
    Each chapter includes many illustrative examples to assist the reader. The book emphasizes methods for finding solutions to differential equations. It provides many abundant exercises, applications, and solved examples with careful attention given to readability. Elementary Differential Equations includes a thorough treatment of power series techniques. In addition, the book presents a classical treatment of several physical problems to show how Fourier series become involved in the solution of those problems. The eighth edition of Elementary Differential Equations has been revised to include a new supplement in many chapters that provides suggestions and exercises for using a computer to assist in the understanding of the material in the chapter. It also now provides an introduction to the phase plane and to different types of phase portraits. A valuable reference book for readers interested in exploring the technological and other applications of differential equations.

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

The Hobbyist's Guide to the RTL-SDR: Really Cheap Software Defined Radio


Carl Laufer - 2014
    The RTL-SDR is a super cheap software defined radio based on DVB-T TV dongles that can be found for under $20. This book is about tips and tutorials that show you how to get the most out of your RTL-SDR dongle. Some projects described in this book are also compatible with other wideband SDRs like the HackRF, Airspy and SDR Play. What's in the book Learn how to set up your RTL-SDR with various free software defined radio programs such as SDR#, HDSDR, SDR-Radio and more. Learn all the little tricks and oddities that the dongle has. A whole chapter dedicated to improving the RTL-SDR's performance. Dozens of tutorials for fun RTL-SDR based projects such as ADS-B aircraft radar, AIS boat radar, ACARS decoding, receiving NOAA and Meteor-M2 weather satellite images, listening to and following trunked radios, decoding digital voice P25/DMR signals, decoding weather balloon telemetry, receiving DAB radio, analysing GSM and listening to TETRA signals, decoding pagers, receiving various HF signals such as ham radio modes, weatherfax and DRM radio, decoding digital D-STAR voice, an introduction to GNU Radio, decoding RDS, decoding APRS, measuring filters and SWR with low cost equipment, and many many more projects! Guide to antennas, cables and adapters. This book is updated every 3-4 months to ensure information is fresh and up to date. Updates are available for free for all customers. Note: To update the book you must manually contact Kindle support and request the update. Last updated to edition 4.1 on 15 June 2015.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

Windows Powershell in Action


Bruce Payette - 2007
    In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.

Computer Networks and Internets [With CDROM and Companion Website Access Code Card]


Douglas E. Comer - 1996
    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.

Schaum's Outline of Advanced Mathematics for Engineers and Scientists


Murray R. Spiegel - 1971
    Fully stocked with solved problemsN950 of themNit shows you how to solve problems that may not have been fully explained in class. Plus you ge"

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.