Book picks similar to
Data Analysis with R by Garrett Grolemund
statistics-r
work
books-i-have-unread
computer-science
Kotlin for Android Developers: Learn Kotlin the easy way while developing an Android App
Antonio Leiva - 2016
Joel on Software
Joel Spolsky - 2004
For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.
Writing Idiomatic Python 2.7.3
Jeff Knupp - 2013
Each idiom comes with a detailed description, example code showing the "wrong" way to do it, and code for the idiomatic, "Pythonic" alternative. *This version of the book is for Python 2.7.3+. There is also a Python 3.3+ version available.* "Writing Idiomatic Python" contains the most common and important Python idioms in a format that maximizes identification and understanding. Each idiom is presented as a recommendation to write some commonly used piece of code. It is followed by an explanation of why the idiom is important. It also contains two code samples: the "Harmful" way to write it and the "Idiomatic" way. * The "Harmful" way helps you identify the idiom in your own code. * The "Idiomatic" way shows you how to easily translate that code into idiomatic Python. This book is perfect for you: * If you're coming to Python from another programming language * If you're learning Python as a first programming language * If you're looking to increase the readability, maintainability, and correctness of your Python code What is "Idiomatic" Python? Every programming language has its own idioms. Programming language idioms are nothing more than the generally accepted way of writing a certain piece of code. Consistently writing idiomatic code has a number of important benefits: * Others can read and understand your code easily * Others can maintain and enhance your code with minimal effort * Your code will contain fewer bugs * Your code will teach others to write correct code without any effort on your part
Flask Web Development: Developing Web Applications with Python
Miguel Grinberg - 2014
With this hands-on book, you’ll learn Flask from the ground up by developing a complete social blogging application step-by-step. Author Miguel Grinberg walks you through the framework’s core functionality, and shows you how to extend applications with advanced web techniques such as database migration and web service communication.Rather than impose development guidelines as other frameworks do, Flask leaves the business of extensions up to you. If you have Python experience, this book shows you how to take advantage of that creative freedom.- Learn Flask’s basic application structure and write an example app- Work with must-have components—templates, databases, web forms, and email support- Use packages and modules to structure a large application that scales- Implement user authentication, roles, and profiles- Build a blogging feature by reusing templates, paginating item lists, and working with rich text- Use a Flask-based RESTful API to expose app functionality to smartphones, tablets, and other third-party clients- Learn how to run unit tests and enhance application performance- Explore options for deploying your web app to a production server
Me Before You by JoJo Moyes - A 30-minute Instaread Summary
Instaread Summaries - 2014
We read every chapter, summarize and analyze it for your convenience. This is an Instaread Summary of 'Me Before You' by JoJo Moyes. Below is a preview of the earlier sections of the summary: Chapter 1 Louisa ‘Lou’ Clark, a member of a working class family in a small English village, has just lost her job. Although both Lou’s father, Bernard, and her sister, Treena, work, neither makes enough money to help the family make ends meet without Lou’s income. For this reason, it is decided that Lou should apply for a new job at the Job Centre as soon as possible. The next day Lou goes to the gym to see her boyfriend, Patrick. He sees Lou’s lost job as an opportunity for her to improve herself and find something better. The counselor at the Job Centre suggests Lou apply as a care assistant for a man in a wheelchair. She is not interested in this job, but she is running out of options. She agrees to go for the interview. Chapter 2 Lou usually wears odd, eccentric clothes. For the job interview, Josie, her mother, insists she wear a business suit. Lou goes to Granta House, an elegant and expensive home next to the local tourist attraction, Stortfold Castle. She is interviewed by Camilla Traynor. Camilla is Will Traynor’s mother. Will became a quadriplegic after being hit by a motorcycle. He already has a nurse named Nathan to take care of his personal and medical needs. Camilla wants to hire someone to be a companion for Will and to stay with him during the day when no one else can be there. Lou thinks the interview goes badly. Therefore, she is surprised when Camilla offers her the job with a six-month contract and generous pay. Chapter 3 Lou reports for work at Granta House the following morning. Camilla shows her around the annexe, a space that was once stables but was turned into guest quarters. This is where Will lives now that he is confined to a wheelchair. Camilla explains her duties to Lou. She makes it clear that Lou is not to leave Will alone and unattended for more than 15 minutes at any one time. Camilla introduces Lou to Will and Nathan, Will’s nurse. Nathan explains Will’s medications to Lou and tells her she is there to cheer Will. Nathan leaves, and Lou and Will are left to get to know each other. It does not go well. Will is sullen, quiet, and talks very little. She keeps herself busy with cleaning and household chores to fill in the time. Lou is unhappy about the first day at her new job. She talks to her sister Treena about it. Treena asks her to stick with the job because she has decided to quit her job and go back to college. She has received a grant to help pay her tuition, but will have to quit her job. Lou feels this puts more pressure on her to earn an income.
Code: The Hidden Language of Computer Hardware and Software
Charles Petzold - 1999
And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries. Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines. It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.
JavaScript Patterns
Stoyan Stefanov - 2010
If you're an experienced developer looking to solve problems related to objects, functions, inheritance, and other language-specific categories, the abstractions and code templates in this guide are ideal -- whether you're writing a client-side, server-side, or desktop application with JavaScript.Written by JavaScript expert Stoyan Stefanov -- Senior Yahoo! Technical and architect of YSlow 2.0, the web page performance optimization tool -- JavaScript Patterns includes practical advice for implementing each pattern discussed, along with several hands-on examples. You'll also learn about anti-patterns: common programming approaches that cause more problems than they solve.Explore useful habits for writing high-quality JavaScript code, such as avoiding globals, using single var declarations, and moreLearn why literal notation patterns are simpler alternatives to constructor functionsDiscover different ways to define a function in JavaScriptCreate objects that go beyond the basic patterns of using object literals and constructor functionsLearn the options available for code reuse and inheritance in JavaScriptStudy sample JavaScript approaches to common design patterns such as Singleton, Factory, Decorator, and moreExamine patterns that apply specifically to the client-side browser environment
Discrete Mathematics
Richard Johnsonbaugh - 1984
Focused on helping students understand and construct proofs and expanding their mathematical maturity, this best-selling text is an accessible introduction to discrete mathematics. Johnsonbaugh's algorithmic approach emphasizes problem-solving techniques. The Seventh Edition reflects user and reviewer feedback on both content and organization.
Working Effectively with Unit Tests
Jay Fields - 2014
Unfortunately, developers are creating mountains of unmaintainable tests as a side effect. I've been fighting the maintenance battle pretty aggressively for years, and this book captures the what I believe is the most effective way to test.This book details my strong opinions on the best way to test, while acknowledging alternative styles and various contexts in which tests are written. Whether you prefer my style or not, this book will help you write better Unit and Functional Tests.
Holy Bible: New Life Version
Anonymous - 2006
This unique scripture version, originally designed to reach people who did not speak English as their native language, uses a limited vocabulary of 850 words to simply and clearly share God's truth. For example, the term justified is rendered "made right with God," and blaspheme is rendered "speak against God." Ideal for seekers, new believers, or even mature Christians who want a new perspective on the Bible, The New Life Version provides the complete Old and New Testaments, along with topical studies and other helpful learning tools.
Chemistry: An Introduction to General, Organic, and Biological Chemistry
Karen C. Timberlake - 1976
Now in it's tenth edition, this text makes chemistry exciting to students by showing them why important concepts are relevant to their lives and future careers.
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
Nursing Care Plans: Diagnoses, Interventions, and Outcomes
Meg Gulanick - 2011
This new edition specifically features three new care plans, two expanded care plans, updated content and language reflecting the most current clinical practice and professional standards, enhanced QSEN integration, a new emphasis on interprofessional collaborative practice, an improved page design, and more. It's everything you need to create and customize effective nursing care plans!
The Book of PoC||GTFO
Manul Laphroaig - 2017
Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
From Mathematics to Generic Programming
Alexander A. Stepanov - 2014
If you're a reasonably proficient programmer who can think logically, you have all the background you'll need. Stepanov and Rose introduce the relevant abstract algebra and number theory with exceptional clarity. They carefully explain the problems mathematicians first needed to solve, and then show how these mathematical solutions translate to generic programming and the creation of more effective and elegant code. To demonstrate the crucial role these mathematical principles play in many modern applications, the authors show how to use these results and generalized algorithms to implement a real-world public-key cryptosystem. As you read this book, you'll master the thought processes necessary for effective programming and learn how to generalize narrowly conceived algorithms to widen their usefulness without losing efficiency. You'll also gain deep insight into the value of mathematics to programming--insight that will prove invaluable no matter what programming languages and paradigms you use. You will learn aboutHow to generalize a four thousand-year-old algorithm, demonstrating indispensable lessons about clarity and efficiencyAncient paradoxes, beautiful theorems, and the productive tension between continuous and discreteA simple algorithm for finding greatest common divisor (GCD) and modern abstractions that build on itPowerful mathematical approaches to abstractionHow abstract algebra provides the idea at the heart of generic programmingAxioms, proofs, theories, and models: using mathematical techniques to organize knowledge about your algorithms and data structuresSurprising subtleties of simple programming tasks and what you can learn from themHow practical implementations can exploit theoretical knowledge