Book picks similar to
Haskell High Performance Programming by Samuli Thomasson


haskell
programming
collection
computer-science-and-software

sed & awk


Dale Dougherty - 1990
    The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

MAC WALKER'S PATRIOT OMNIBUS


D.W. Ulsterman - 2014
    He protects those he loves with a ferocity and purpose few can overcome. If challenged, he takes a "kill first, question later" approach. His life has taken him around the world and back again, to a home that is no longer his, in a country that would see him dead. He seeks both truth and purpose in himself and others, at a time when the traditions and values of old do battle against the emerging tyranny of the present. He is Mac Walker, and this is his story, spanning decades, available here as a single download for the first time ever, allowing readers to save up to 50% over purchasing each of the Mac Walker stories individually. SEVEN STORIES - ONE LOW PRICE! "Being a 77 year old widow and knowing I would never fall in love again, I'm afraid that Ulsterman's writing has caused me to fall in love with his fictional character, Mac Walker! What a MAN!" -Patricia Tadlock “All of the Mac Walker books are great! Once you start reading, you cannot put them down! If I could meet any character of any book, it would be Mac Walker!” --Lyn R. Toney “Excellent read. Readers can certainly relate to Mac Walker as a truly believable hero.” -Cavalry

Unexpected Love for a Stubborn Bride


Evelyn Boyett - 2019
     Hope Dixon was just a young girl when she moved to Hazelridge, Texas with her parents. Their lives have been ideal until the discovery of silver in the nearby hills three years ago. After that the town has grown increasingly lawless with the huge influx of new settlers and prospectors hoping to make their fortunes and a bought sheriff with seemingly no interest in maintaining law and order. She feels a heavy weight of responsibility knowing that with her father’s steadily failing health, it won’t be long before her mother and younger sister’s future well being will soon rest squarely on her shoulders. Luke Riggs was a Civil War hero. When he returned home, his former fiancée who’d promised to wait for him had run off and married another man. Deeply heartbroken and betrayed, he promised himself he would never open himself up to the possibility of finding love again. Hope is stubborn and determined to step up and fight, but she's going to need help, someone who will stand with her against the outlaws and thieves threatening her life. Can Hope find the courage to protect her family, tell the man she loves how she really feels, and save their home? Or will her fear keep her trapped for the rest of her life? If you like fast-paced clean romance and action-packed stories, you won't be able to put down this addictive Novel by Evelyn Boyett. "Unexpected Love For A Stubborn Bride" is a stand-alone Western Historical Romance Novel of approximately 500 pages. Get this Book FREE With Kindle Unlimited!

Hope Hadley Nine Book Cozy Mystery Set


Meredith Potts - 2018
    Before she has a chance to piece her life back together, her best friend's boyfriend is murdered. Even worse, the local police wrongfully suspect that her friend is the killer. Determined to clear her friend's name, Hope sets out to find the real killer herself.

Billionaire's Passion: The Complete Series


Alycia Taylor - 2016
    Having just moved in with her brother, Marcy’s about to start a new job at Farnsworth & Temple, a financial software company run by billionaire Dean Carrick. Marcy never thought she’d be anyone’s trophy girlfriend, but the night before she’s to start as an intern, fate intervenes and Dean Carrick comes into her life… And not as her boss... At first casual, the relationship starts to grow. But as Marcy learns more and more about her new beau, she comes to find out there’s no such thing as a billionaire without skeletons in his closet. When stories start getting back to Marcy about Dean’s possible connections to organized crime, Marcy’s life is thrown into chaos. What follows is a torrid affair of danger and suspicion leading to the ultimate question: How far is she willing to go to save herself? And will Dean be there for her in the end? The Billionaire's Passion Box Set is a 100,000-word, FULL LENGTH, Standalone steamy sexy bad boy alpha billionaire romance. No cliffhanger and has a HEA. Includes 3 free bonus full-length box sets for a limited time. Perfect for fans of Cassie Cross, Hannah Ford, Glenna Sinclair, Kendall Ryan, Krista Lakes, Alexa Riley, and J.S. Scott

Special 15 Book Box Set: Regency Romance


Kitty St. John - 2017
    Regency Romance. 15 exciting romantic stories of dukes, earles and other aristocracy titles. Romantic, compelling and appealing reads of Regency nobility trying to find love with ladies of all classes of society. Their adventures spin heart-warming tales. Kitty St John is a lovely newcomer to Regency Romance stories. She gives a very interesting story that tugs at your very heart strings! “I enjoy Kitty St John's writing style. The story moved along in a good pace and I did not feel the need to take breaks along the way. I found that while she wrote a story, it did make me think, what would I do? I could see both characters point of view and yet the author didn't beleaguer the point. When I finished reading this book, I felt I wanted, no needed to read more of her style books. Nothing is worse than those authors who, go over and over a point to the point of making one want to throw the book/kindle at a wall. You won't find that in this book at all. Thanks for a quick read Kitty.” This Box Set Includes: Her Baron, Bold and Brave The Duke's Discovery The Duke's Favourite The Refined Earl The Honourable Duke The Duke's Fifth Governess The Poetic Marquess The Hidden Duke The Duke's Good Fortune The Erin Duke The Earl Incognito The Starry Eyed Earl The Bemused Earl The Earl's Daughter The Admirable Viscount

The Obsolescence Trilogy: Complete Series Box Set: A Post-Apocalyptic Science Fiction Thriller


Chris Muhlenfeld - 2018
    They were away from the chaos, and they thought they were safe. They thought wrong.What will they do?All across the country cities are in crisis.Logan and his family look out from their Manhattan penthouse. The world is crumbling before their eyes. Unprepared, he’s got to do something. They can’t stay. But how can they leave and where will they go?Someone has a solution.It’s Logan’s domestic android.Can he believe a machine?You won’t believe the twists and turns, but you’ll love the adventure.Get it now.

Classic Shell Scripting: Hidden Commands that Unlock the Power of Unix


Arnold Robbins - 2005
    It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.

Let Us C++


Yashavant P. Kanetkar - 2003
    A CD-ROM with demos, code, compiler, executables, and MATLAB examples has been added to the book. Simplicity and an easy narration style are the hallmarks of the book, which have made its previous seven editions immensely successful. Today s C programmer (still the language of choice in science, engineering, game programming and for handheld devices) has to master the complexities of the language and contend with its usage in environments like Windows, Linux, and for the Internet. This book covers these three aspects of C programming and doesn t assume any programming background. It begins with the basics and steadily builds the pace, so the reader finds it easy to handle more complicated topics later. This popular author has crafted hundreds of excellent programming examples and exercises for every aspect of C programming. ++++Features +Self-study format provides hundreds of step by step examples and exercises + Assumes no programming knowledge; starts with the basics and progresses to more difficult topics +Includes a CD-ROM with demos, code, compiler, executables, and MATLAB examples +Covers the latest programming techniques for Windows, Linux, and the Internet ++++++Selected Topics Traditional C Programming; Pointers; Complete Build Process; Low-level File I/O; Structures, Unions, Bit-fields; Bitwise Operators. C Under Linux; Signals and Signal Handling; Blocking of Signals; Event Driven Programming; Process; PIDs; Zombies; GNOME Programming Using GTK Library. C Under Windows. Windows Programming Model; Windows Messaging Architecture; Mouse Programming; GDI. Internet Programming. CP/ IP model; Windsock Library; Building Time Clients; Whois and HTTP Clients; Sending & Receiving emails

Flask Web Development: Developing Web Applications with Python


Miguel Grinberg - 2014
    With this hands-on book, you’ll learn Flask from the ground up by developing a complete social blogging application step-by-step. Author Miguel Grinberg walks you through the framework’s core functionality, and shows you how to extend applications with advanced web techniques such as database migration and web service communication.Rather than impose development guidelines as other frameworks do, Flask leaves the business of extensions up to you. If you have Python experience, this book shows you how to take advantage of that creative freedom.- Learn Flask’s basic application structure and write an example app- Work with must-have components—templates, databases, web forms, and email support- Use packages and modules to structure a large application that scales- Implement user authentication, roles, and profiles- Build a blogging feature by reusing templates, paginating item lists, and working with rich text- Use a Flask-based RESTful API to expose app functionality to smartphones, tablets, and other third-party clients- Learn how to run unit tests and enhance application performance- Explore options for deploying your web app to a production server

The Little Elixir & OTP Guidebook


Benjamin Tan Wei Hao - 2015
    It combines the productivity and expressivity of Ruby with the concurrency and fault-tolerance of Erlang. Elixir makes full use of Erlang's powerful OTP library, which many developers consider the source of Erlang's greatness, so you can have mature, professional-quality functionality right out of the gate. Elixir's support for functional programming makes it a great choice for highly distributed event-driven applications like IoT systems.The Little Elixir & OTP Guidebook gets you started programming applications with Elixir and OTP. You begin with a quick overview of the Elixir language syntax, along with just enough functional programming to use it effectively. Then, you'll dive straight into OTP and learn how it helps you build scalable, fault-tolerant and distributed applications through several fun examples. Come rediscover the joy of programming with Elixir and remember how it feels like to be a beginner again.

ZooKeeper: Distributed process coordination


Flavio Junqueira - 2013
    This practical guide shows how Apache ZooKeeper helps you manage distributed systems, so you can focus mainly on application logic. Even with ZooKeeper, implementing coordination tasks is not trivial, but this book provides good practices to give you a head start, and points out caveats that developers and administrators alike need to watch for along the way.In three separate sections, ZooKeeper contributors Flavio Junqueira and Benjamin Reed introduce the principles of distributed systems, provide ZooKeeper programming techniques, and include the information you need to administer this service.Learn how ZooKeeper solves common coordination tasksExplore the ZooKeeper API’s Java and C implementations and how they differUse methods to track and react to ZooKeeper state changesHandle failures of the network, application processes, and ZooKeeper itselfLearn about ZooKeeper’s trickier aspects dealing with concurrency, ordering, and configurationUse the Curator high-level interface for connection managementBecome familiar with ZooKeeper internals and administration tools

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


T.J. O'Connor - 2012
    Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.