Processing: A Programming Handbook for Visual Designers and Artists


Casey Reas - 2007
    This book is an introduction to the concepts of computer programming within the context of the visual arts. It offers a comprehensive reference and text for Processing (www.processing.org), an open-source programming language that can be used by students, artists, designers, architects, researchers, and anyone who wants to program images, animation, and interactivity. The ideas in Processing have been tested in classrooms, workshops, and arts institutions, including UCLA, Carnegie Mellon, New York University, and Harvard University. Tutorial units make up the bulk of the book and introduce the syntax and concepts of software (including variables, functions, and object-oriented programming), cover such topics as photography and drawing in relation to software, and feature many short, prototypical example programs with related images and explanations. More advanced professional projects from such domains as animation, performance, and typography are discussed in interviews with their creators. "Extensions" present concise introductions to further areas of investigation, including computer vision, sound, and electronics. Appendixes, references to additional material, and a glossary contain additional technical details. Processing can be used by reading each unit in order, or by following each category from the beginning of the book to the end. The Processing software and all of the code presented can be downloaded and run for future exploration.Includes essays by Alexander R. Galloway, Golan Levin, R. Luke DuBois, Simon Greenwold, Francis Li, and Hernando Barragan and interviews with Jared Tarbell, Martin Wattenberg, James Paterson, Erik van Blockland, Ed Burton, Josh On, Jurg Lehni, Auriea Harvey and Michael Samyn, Mathew Cullen and Grady Hall, Bob Sabiston, Jennifer Steinkamp, Ruth Jarman and Joseph Gerhardt, Sue Costabile, Chris Csikszentmihalyi, Golan Levin and Zachary Lieberman, and Mark Hansen.Casey Reas is Associate Professor in the Design Media Arts Department at the University of California, Los Angeles. Ben Fry is Nierenburg Chair of Design in the School of Design at Carnegie Mellon University, 2006-2007."

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Modern Compressible Flow: With Historical Perspective


John D. Anderson Jr. - 1981
    In keeping with previous versions, the 3rd edition uses numerous historical vignettes that show the evolution of the field. New pedagogical features--"Roadmaps" showing the development of a given topic, and "Design Boxes" giving examples of design decisions--will make the 3rd edition even more practical and user-friendly than before. The 3rd edition strikes a careful balance between classical methods of determining compressible flow, and modern numerical and computer techniques (such as CFD) now used widely in industry & research. A new Book Website will contain all problem solutions for instructors.

Learn Python 3 the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code (Zed Shaw's Hard Way Series)


Zed A. Shaw - 2017
    

DevOps Troubleshooting: Linux Server Best Practices


Kyle Rankin - 2012
    It has saved me hours in troubleshooting complicated operations problems." -Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In DevOps Troubleshooting: Linux Server Best Practices , award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You'll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps' approach to troubleshooting and proven Linux server problem-solving principles Diagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecks Understand healthy boots, so you can identify failure points and fix them Solve full or corrupt disk issues that prevent disk writes Track down the sources of network problems Troubleshoot DNS, email, and other network services Isolate and diagnose Apache and Nginx Web server failures and slowdowns Solve problems with MySQL and Postgres database servers and queries Identify hardware failures-even notoriously elusive intermittent failures

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Physics, Volume 2


David Halliday - 1991
    The Fourth Edition of volumes 1 and 2 is concerned with mechanics and E&M/Optics. New features include: expanded coverage of classic physics topics, substantial increases in the number of in-text examples which reinforce text exposition, the latest pedagogical and technical advances in the field, numerical analysis, computer-generated graphics, computer projects and much more.

Physics, Volume 1


Robert Resnick - 1966
    The Fourth Edition of volumes 1 and 2 is concerned with mechanics and E&M/Optics. New features include: expanded coverage of classic physics topics, substantial increases in the number of in-text examples which reinforce text exposition, the latest pedagogical and technical advances in the field, numerical analysis, computer-generated graphics, computer projects and much more.

Principles of Biochemistry


Albert L. Lehninger - 1970
    Lehninger Principles of Biochemistry, Fourth Edition brings clarity and coherence to an often unwieldy discipline, while incorporating the field's most important recent developments and applications.

The World Of Carbon


Isaac Asimov - 1958
    

Cocoa Programming for Mac OS X


Aaron Hillegass - 2001
    Now updated for both current developments in OS 10.4 and 10.5, this comprehensive guide to developing Cocoa guides programmers through the key features of Cocoa, and takes them step by step through the creation of typical applications.

Tcp/IP Illustrated, Volume 3: TCP for Transactions, Http, Nntp, and the Unix Domain Protocols


W. Richard Stevens - 1996
    As in the previous two volumes, the book is filled with examples and implementation details within the 4.4BSD-Lite networking code. The TCP/IP Illustrated series provides a complete picture of the protocol suite that drives the Internet, and gives programmers, system administrators, and serious users the information, understanding, and skills they need to remain at the forefront of networking technology.

An Introduction to Brain and Behavior


Bryan Kolb - 2000
    Each chapter of An Introduction to Brain and Behavior explores a specific question asked by working neuroscientists and students (i.e. "Why do we have a brain?"  "How is the nervous system organized?").  This approach brings coherence to a vast subject, and helps students understand what information is important as their study of brain and behavior progresses chapter to chapter.

Gray Hat Hacking: The Ethical Hacker's Handbook


Shon Harris - 2004
    Section I: Exploits 202; Chapter 1: Survival; Chapter 2: Basic Exploits; Chapter 3: Advance Exploits; Chapter 4: Writing Shell Code; Section II: Vulnerability Analysis; Chapter 5: Passive Analysis; Chapter 6: Active Analysis; Chapter 7: Bug to Exploit; Chapter 8: Mitigation; Section III: Advanced System Hacks; Chapter 9: Advanced.