Haskell: The Craft of Functional Programming


Simon Thompson - 1996
    Running examples and case studies highlight new concepts and alternative approaches to program design.

C: How to Program


Harvey Deitel - 1992
    Highly practical in approach, this text introduces fundamental notions of structured programming and software engineering - and progresses quickly to more intermediate material. It covers the full C language, key library functions, object-oriented programming in C++ and Java, and event-driven GUI programming in Java. - NEW - 300 page introduction to C++, brings students up-to-date with material from the recently revised C++ How to Program, 4/E - assuming only the C material as a prerequisite. - Updated introduction to Java 2 and programming GUIs, familiarizes students with content from the recently revised Java[trademark] How to Program, 5/Eassuming only the C material as a prerequisite. - A standalone appendix on the latest C standard - C99 - Contains several Live-Code[trademark] examples demonstrating the powerful new capabilities of C99, motivates the rational for C99 and highlights key differences between C99 and the version of standard C presented in Chapters 2-14. - Use of a pseudocode approach to structured program developmen

Systems Analysis and Design


Gary B. Shelly - 1991
    Students will find concepts easy-to-understand through the clear writing style and full-color figures that illustrate current technology and trends. Examples and cases are drawn from actual systems projects that enable students to learn in the context of solving problems, much like the ones they will encounter on the job. This approach, combined with motivating tools such as the SCR Associates interactive Web-Based Case Study, Systems Analyst's Toolkit, the Student Study Tool on CD-ROM, and more, makes Systems Analysis and Design, Seventh Edition a wise and exciting choice for your introductory systems analysis and design class.

Ted Bundy: The Horrific True Story behind America's Most Wicked Serial Killer (Real Crime By Real Killers Book 4)


Ryan Becker - 2018
    history. A murderer’s tale is not always shrouded in darkness, trauma and failure to perform as a normal person. Some killers are just as successful in life as those around them or even more so. They are able to function as any regular human being and charm their communities and victims into believing that they are of a good, pure nature. Ted Bundy was a handsome, charming and ambitious man who carried his hatred deeper and more hidden than any other murderers do. He was able to lead a life that included normal friendships and relationships, and he even got far as both a student and a politician. But the hatred was there…it was always there… Bundy ended the lives of over thirty young women, ensuring that their final moments were ugly and violent. His torture methods were cruel, and there was no mercy shown to each female as he bludgeoned, strangled or cut them. Ted Bundy - The Campus Killer - a name of nightmares. This is his story.

Machine Learning: The Art and Science of Algorithms That Make Sense of Data


Peter Flach - 2012
    Peter Flach's clear, example-based approach begins by discussing how a spam filter works, which gives an immediate introduction to machine learning in action, with a minimum of technical fuss. Flach provides case studies of increasing complexity and variety with well-chosen examples and illustrations throughout. He covers a wide range of logical, geometric and statistical models and state-of-the-art topics such as matrix factorisation and ROC analysis. Particular attention is paid to the central role played by features. The use of established terminology is balanced with the introduction of new and useful concepts, and summaries of relevant background material are provided with pointers for revision if necessary. These features ensure Machine Learning will set a new standard as an introductory textbook.

Linux Server Hacks: 100 Industrial-Strength Tips and Tools


Rob Flickenger - 2003
    Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks.Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.

The System: Who Owns the Internet, and How It Owns Us


James Ball
    All are owned by someone, financed by someone, regulated by someone.We refer to the internet as abstract from reality. By doing so, we obscure where the real power lies.In this powerful and necessary book, James Ball sets out on a global journey into the inner workings of the system. From the computer scientists to the cable guys, the billionaire investors to the ad men, the intelligence agencies to the regulators, these are the real-life figures powering the internet and pulling the strings of our society.Ball brilliantly shows how an invention once hailed as a democratising force has concentrated power in places it already existed – that the system, in other words, remains the same as it did before.

Professional Excel Development: The Definitive Guide to Developing Applications Using Microsoft Excel and VBA


Stephen Bullen - 2005
    It has become adevelopment platform in it own right. Applications written using Excel are partof many corporations' core suites of business-critical applications. In spite ofthis, Excel is too often thought of as a hobbyist's platform. While there arenumerous titles on Excel and VBA, until now there have been none thatprovide an overall explanation of how to develop professional-quality Excel-basedapplications. All three authors are professional Excel developers who runtheir own companies developing Excel-based apps for clients ranging fromindividuals to the largest multinational corporations. In this book they showhow anyone from power users to professional developers can increase thespeed and usefulness of their Excel-based apps.

Clevenger Gold: The True Story of Murder and Unfound Treasure


S.E. Swapp - 2016
    Once the old, cantankerous Sam Clevenger and his wife, Charlotte, hired Frank Willson and John Johnson to help with the move, their fate took a dark turn. These true events were documented by journalists through the 1887 trial and well into the 1900s, and stories have been told of Sam’s unfound treasure for nearly 130 years. But, this is the first detailed, documented, and vetted account of their bizarre and fascinating tale.