Book picks similar to
Inside the Python Virtual Machine by Obi Ike-Nwosu


computer-science
computer-science-and-related-stuff
python
virtual-machine

Computer Graphics with OpenGL


Donald Hearn - 2003
    The text converts all programming code into the C++ language.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Eleventh Hour CISSP®: Study Guide


Eric Conrad - 2016
    This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time

Principles of Information Systems


Ralph M. Stair - 1992
    The overall vision, framework, and pedagogy that made the previous editions so popular has been retained, making this a highly comprehensive IS text. Accomplished authors Ralph Stair and George Reynolds continue to expose their readers to clear learning objectives that are reinforced by timely, real-world business examples and hands-on activities. Regardless of their major, students can use this book to understand and practice fundamental IS principles so that they can function more efficiently and effectively as workers, managers, decision makers, and organizational leaders.

Windows 10: The Missing Manual


David Pogue - 2015
    Windows 10 (a free update to users of Windows 8 or Windows 7) fixes a number of the problems introduced by the revolution in Windows 8 and offers plenty of new features, such as the new Spartan web browser, Cortana voice-activated "personal assistant," new universal apps (that run on tablet, phone, and computer), and more. But to really get the most out of the new operating system, you're going to need a guide.Thankfully, Windows 10: The Missing Manual will be there to help. Like its predecessors, this book from the founder of Yahoo Tech, previous New York Times columnist, bestselling author, and Missing Manuals creator David Pogue illuminates its subject with technical insight, plenty of wit, and hardnosed objectivity for beginners, veteran standalone PC users, new tablet owners, and those who know their way around a network.

All In One ENGLISH CORE CBSE Class 12 2019-20


Arihant Experts - 2019
    From inception till e book comes out from print, e whole team comprising of auors,.

Social Media Marketing for Publishers


Liz Murray - 2012
    

Basic VLSI Design


Douglas A. Pucknell - 1985
    It also provides a straightforward but comprehensive treatment of VLSI design processes and design rules for students and all novice digital systems designers.

Domain-Driven Design in PHP


Carlos Buenosvinos
    Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.

Working with UNIX Processes


Jesse Storimer - 2011
    Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...

What Hedge Funds Really Do: An Introduction to Portfolio Management


Philip J. Romero - 2014
    We’ve comea long way since then. With this book, Drs. Romero and Balch liftthe veil from many of these once-opaque concepts in high-techfinance. We can all benefit from learning how the cooperationbetween wetware and software creates fitter models. This bookdoes a fantastic job describing how the latest advances in financialmodeling and data science help today’s portfolio managerssolve these greater riddles. —Michael Himmel, ManagingPartner, Essex Asset ManagementI applaud Phil Romero’s willingness to write about the hedgefund world, an industry that is very private, often flamboyant,and easily misunderstood. As with every sector of the investmentlandscape, the hedge fund industry varies dramaticallyfrom quantitative “black box” technology, to fundamental researchand old-fashioned stock picking. This book helps investorsdistinguish between these diverse opposites and understandtheir place in the new evolving world of finance. —Mick Elfers,Founder and Chief Investment Strategist, Irvington Capital

Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Fawlty Towers


Graham McCann - 2007
    The Major; "Don't mention the war!;" "He's from Barcelona;" Basil the Rat—everyone has a favorite line, moment, or character. In the first biography of the show, Graham McCann holds up to the light each of the unpredictable elements—the demented brilliance of John Cleese, his creative partnership with Connie Booth—that added up to an immortal sitcom, beloved all over the world, even in Barcelona.

Coding Interview Questions


Narasimha Karumanchi - 2012
    Peeling Data Structures and Algorithms: * Programming puzzles for interviews * Campus Preparation * Degree/Masters Course Preparation * Instructor's * GATE Preparation * Big job hunters: Microsoft, Google, Amazon, Yahoo, Flip Kart, Adobe, IBM Labs, Citrix, Mentor Graphics, NetApp, Oracle, Webaroo, De-Shaw, Success Factors, Face book, McAfee and many more * Reference Manual for working people