Book picks similar to
Fedora Linux Toolbox: 1000+ Commands for Fedora, CentOS and Red Hat Power Users by Christopher Negus
audio_wanted
computer-science
it
references
Problem Solving with Algorithms and Data Structures Using Python
Bradley N. Miller - 2005
It is also about Python. However, there is much more. The study of algorithms and data structures is central to understanding what computer science is all about. Learning computer science is not unlike learning any other type of difficult subject matter. The only way to be successful is through deliberate and incremental exposure to the fundamental ideas. A beginning computer scientist needs practice so that there is a thorough understanding before continuing on to the more complex parts of the curriculum. In addition, a beginner needs to be given the opportunity to be successful and gain confidence. This textbook is designed to serve as a text for a first course on data structures and algorithms, typically taught as the second course in the computer science curriculum. Even though the second course is considered more advanced than the first course, this book assumes you are beginners at this level. You may still be struggling with some of the basic ideas and skills from a first computer science course and yet be ready to further explore the discipline and continue to practice problem solving. We cover abstract data types and data structures, writing algorithms, and solving problems. We look at a number of data structures and solve classic problems that arise. The tools and techniques that you learn here will be applied over and over as you continue your study of computer science.
Computer Networks and Internets [With CDROM and Companion Website Access Code Card]
Douglas E. Comer - 1996
Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.
Batman: Arkham Knight (2015-) #1
Peter J. Tomasi - 2015
Arkham City is closed. As a new day begins, Bruce Wayne finds himself in devastating pain, recovering from his injuries and questioning whether his role as Batman is still necessary to the city’s survival. But as the sun rises in Gotham City, dangerous new threats emerge from the shadows…and the Arkham Knight is just beginning. Don’t miss this in-continuity prequel comic set prior to the events of the brand-new video game Batman: Arkham Knight!
The Shadowmen
David Hagberg - 2016
Early in his career, he came up against the Soviet Union's deadliest agent three times, finally killing the man in a flooded tunnel beneath the ruins of a castle in Portugal.Years have passed. The Russian's brother, Kurshin, a Spetsnaz operator twenty-five years younger than McGarvey, vows revenge. He and McGarvey are both shadowmen--living between the real world, and the world of the deep cover spy and assassin. To get McGarvey's attention, Kurshin desecrates the grave of the American's wife. McGarvey pits himself against the Russian--the man of vast experience versus the bold young man who believes he is invincible. The mano a mano begins at Arlington Cemetery and moves across Europe, from the baccarat tables of Monte Carlo to the same the Portuguese castle where the Russian's brother was killed so many years ago. Only one shadowman will be left standing.At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
The Sleep Of The Dead
Tom Bradby - 2001
But these are not the only scars that have resolutely refused to heal. Shortly afterwards, Colonel Mitchell Havilland sacrificed himself on a Falklands hillside in an act of characteristic - but baffling - heroism. When Julia comes home from China fifteen years later, it is to a place of ghosts.
Whilst she awaits the outcome of the enquiry that seems destined to end her short but spectacular career in military intelligence, Julia is drawn back across the landscape of the past, to find that it is not just the tortured image of her much-loved father that returns to haunt her. Everything she has ever believed in and lived for has suddenly been called into question, and unless she confronts her demons, she will not survive. For there have been other deaths, and the dead will not sleep...
At once a race-against-the-clock thriller and a complex psychological drama where the memories of the past conflict with knowledge of the present, The Sleep of the Dead is a stunning read on any level and more than confirms Tom Bradby as one of this country's foremost thriller writers.
Praise for Shadow Dancer:
'Quite exceptional...Tom Bradby succeeds in creating real characters. Far too many novels take refuge in cliché and caricature - Bradby refuses to. The language, the tension, the fear - all are portrayed vividly and correctly...A taut, compelling story of love and torn loyalties'Daily Telegraph
'A remarkable first novel...Bradby handles the tension with skill to produce a gripping tale'The Times
'The best book on the northern conflict since Harry's Game...An excellent read on any level. It scores heavily as a thriller and as an accurate unblinking look at what is happening right now'Irish Independent
Dr. Z: The Lost Memoirs of an Irreverent Football Writer
Paul Zimmerman - 2017
Z came to expect a certain alchemical, trademark blend: words which were caustic and wry, at times self-deprecating or even puzzling, but always devilishly smart with arresting honesty. A complex package, that's the Doctor. The one-time sparring partner of Ernest Hemingway, Paul Zimmerman is one of the modern era's groundbreaking football minds, a man who methodically charted every play while generating copious notes, a human precursor to the data analytics websites of today. In 2008, Zimmerman had nearly completed work on his personal memoirs when a series of strokes left him largely unable to speak, read, or write. Compiled and edited by longtime SI colleague Peter King, these are the stories he still wants to see told. Dr. Z’s memoir is a rich package of personalities, stories never shared about such characters as Vince Lombardi, Walter Payton, Lawrence Taylor, and Johnny Unitas. Even Joe Namath, with whom Zimmerman had a legendary and well-documented 23-year feud, saw fit to eventually unburden himself to the remarkable scribe. Also included are Zimmerman's encounters with luminaries and larger-than-life figures outside of sports, notably Donald Trump, Rupert Murdoch, and Hunter S. Thompson. But not to be missed are Zimmerman's quieter observations on his own life and writing, witticisms and anecdotes which sway between the poignant and hilarious. No matter the topic, Dr. Z: the Lost Memoirs of an Irreverent Football Writer proves essential, compelling reading for sports fans old and new.
Kotlin for Android Developers: Learn Kotlin the easy way while developing an Android App
Antonio Leiva - 2016
Windows Powershell in Action
Bruce Payette - 2007
In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.
Heist: The True Story Of The World's Biggest Cash Robbery
Howard Sounes - 2008
From the author of the bestselling true-crime classic 'Fred & Rose', comes the astonishing inside story of the world's biggest cash robbery: the Tonbridge Securitas heist.
Thinking in CSS
Aravind Shenoy - 2014
Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
Finding Suzy: The Hunt for Missing Estate Agent Suzy Lamplugh and 'Mr Kipper'
David Videcette - 2021
However, the Crown Prosecution Service refused to charge him, citing a lack of evidence.High-profile searches were conducted, yet Suzy’s body was never found; the trail that might lead investigators to her, long since lost.Haunted by another missing person case, investigator and former Scotland Yard detective, David Videcette, has spent five years painstakingly reinvestigating Suzy’s cold case disappearance.Through a series of incredible new witness interviews and fresh groundbreaking analysis, he uncovers piece by piece what happened to Suzy and why the case was never solved.People don't just disappear...
Data Structures and Algorithms
Alfred V. Aho - 1983
Algorithm design techniques are also stressed and basic algorithm analysis is covered. Most of the programs are written in Pascal.
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Alan T. Norman - 2016
Get this Amazing #1 Amazon Top Release - Great Deal! You can read on your PC, Mac, smartphone, tablet or Kindle device. This book will teach you how you can protect yourself from most common hacking attacks -- by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack. Within this book are techniques and tools that are used by both criminal and ethical hackers – all the things that you will find here will show you how information security can be compromised and how you can identify an attack in a system that you are trying to protect. At the same time, you will also learn how you can minimise any damage in your system or stop an ongoing attack. Read this book for FREE on Kindle Unlimited - Download NOW! With Hacking: Computer Hacking Beginners Guide…, you'll learn everything you need to know to enter the secretive world of computer hacking. It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Spoofing Techniques WiFi Hacking Hacking Tools Your First Hack Passive Attacks Download Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack right away - This Amazing New Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, WiFi hacking, and tips for ethical hacking. You'll even learn how to make your first hack. Today For Only $3.99 $5.99 $0.99. Scroll Up And Start Enjoying This Amazing Deal Instantly
Fast Metabolism 14: Lose 14 Pounds in 14 Days by Harnessing the Power of Food
Haylie Pomroy - 2018