A New Kind of Science


Stephen Wolfram - 1997
    Wolfram lets the world see his work in A New Kind of Science, a gorgeous, 1,280-page tome more than a decade in the making. With patience, insight, and self-confidence to spare, Wolfram outlines a fundamental new way of modeling complex systems. On the frontier of complexity science since he was a boy, Wolfram is a champion of cellular automata--256 "programs" governed by simple nonmathematical rules. He points out that even the most complex equations fail to accurately model biological systems, but the simplest cellular automata can produce results straight out of nature--tree branches, stream eddies, and leopard spots, for instance. The graphics in A New Kind of Science show striking resemblance to the patterns we see in nature every day. Wolfram wrote the book in a distinct style meant to make it easy to read, even for nontechies; a basic familiarity with logic is helpful but not essential. Readers will find themselves swept away by the elegant simplicity of Wolfram's ideas and the accidental artistry of the cellular automaton models. Whether or not Wolfram's revolution ultimately gives us the keys to the universe, his new science is absolutely awe-inspiring. --Therese Littleton

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system

Ethics in Information Technology


George W. Reynolds - 2002
    This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.

Tintinalli's Emergency Medicine: A Comprehensive Study Guide


Judith E. Tintinalli - 1978
    It is more concise and easier to read than some, yet it covers the breadth of emergency medicine practice more comprehensively than others. The bottom line is that I like this book. Just as previous editions did, the seventh presents all of the most pertinent and up-to-date information in a well-organized format that is comprehensive yet easy to read. That and many of the attractive new features in this current edition will ensure its place on my bookshelf for years to come."--JAMAWith 418 contributors representing over 120 medical centers around the world, Tintinalli’s Emergency Medicine is the most practical and clinically rigorous reference of its kind. It covers everything from prehospital care, disaster preparedness, and basic resuscitative techniques, to all the major diseases requiring emergency treatment, such as pulmonary emergencies, renal and GU disorders, and hemophilia. This authoritative, in-depth coverage makes this classic text indispensible not only in emergency departments, but also for residents and practitioners when studying or preparing for any exam they may face.While continuing to provide the most current information for acute conditions, the Seventh Edition of Tintinalli’s Emergency Medicine has been substantially revised and updated to cover all of the conditions for which patients seek emergency department care in a concise and easy-to-read-manner.NEW Features• Full-color design with more figures and tables than ever• Reader-friendly chapter presentation makes it easy to find important material.• Updated tables covering drugs and important clinical information• Patient safety considerations and injury prevention are integrated into chapters, as appropriate• Total revision of the dermatology section enables diagnosis by lesion description and body area affected, and provides current treatment• Organ systems sections reorganized to reflect considerations for actual clinical practice.• New chapters: New adult chapters include Natural Disasters, Aneurysms of the Aorta and Major Arteries; Hip and Knee Pain, Aortic Dissection; Acute Urinary Retention; Subarachnoid Hemorrhage and Intracranial Bleeding; Clotting Disorders; Community –acquired Pneumonia and Noninfectious Pulmonary Infiltrates; Type I Diabetes; Type II Diabetes; Anemia; Tests of Hemostasis; Clotting Disorders; Head Injury in Adults and Children; the Transplant Patient; Grief, Death and Dying; and Legal Issues in Emergency Medicine. Twelve new pediatric chapters including The Diabetic Child, Hematologic-Oncologic Emergencies, Ear and Mastoids, Eye Problems in Infants and Children, Neck Masses, GI Bleeding, Nose and Sinuses, Urologic and Gynecologic Procedures in children, Renal emergencies in children, Behavioral and Psychiatric Disorders in children, Pediatric Procedures, Pediatric ECG Interpretation• Greater coverage of procedures throughout for the most common conditions seen in the emergency department.• Companion DVD features an additional 17 chapters, such as Hyperbaric Oxygen Therapy, Principles of Imaging, Prison Medicine, Military Medicine, The Violent Patient, Forensics, Wound Ballistics, and Drug Interactions.• Companion DVD also features videos and animations for teaching and learning performance of important procedures, especially Ultrasound-Guided Procedures

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

LDAP System Administration


Gerald Carter - 2003
    That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

Art in Theory, 1815–1900: An Anthology of Changing Ideas


Charles Harrison - 1998
    Art in Theory, 1815–1900 provides the most wide-ranging and comprehensive collection of documents ever assembled on nineteenth-century theories of art.

The 125 Best Brain Teasers of All Time: A Mind-Blowing Challenge of Math, Logic, and Wordplay


Marcel Danesi - 2018
    Collected here to keep your wits sharp, The Best Brain Teasers of All Time features the cleverest brain teasers from around the world and throughout history.The Best Brain Teasers of All Time gives you hours of fun-filled entertainment with brain teasers that develop your problem-solving skills in math, logic, and wordplay. Organized as an integrated challenge, these brain teasers build in momentum as they increase in difficulty from classic nursery rhymes to the riddle of the sphinx.The Best Brain Teasers of All Time puts your mind to the test with: 125 Brain Teasers that require no special skills to solve. Plus, each question comes with an optional clue in case you get stumped and a handy answer key in the back to test yourself or play with friends Brain Teasers for Every Level that cater to beginners and advanced masterminds alike, with brain teasers organized by level of difficulty to improve your skills as you move forward Hints of History that provide fun facts and background information for every brain teaser Get ready to sharpen your wit with every “aha” moment. The Best Brain Teasers of All Time is a go-to source for timeless fun and mind-blowing challenges.

Mummy Math: An Adventure in Geometry


Cindy Neuschwander - 2005
    FWUMP! A secret door suddenly closed behind them . . .Matt and Bibi use math to escape from a pharaoh's tomb!When the Zills family is summoned to Egypt to help find the hidden burial site of an ancient pharaoh, Matt and Bibi are locked into an adventure they did not expect. Stuck inside a pyramid with only each other, their dog Riley, and geometric hieroglyphics to help them find their way, the twins must use their math knowledge to solve the riddles on the walls and locate the burial chamber. Luckily, the two know their stuff when it comes to geometric solids.

The Computer and the Brain


John von Neumann - 1958
    This work represents the views of a mathematician on the analogies between computing machines and the living human brain.

Quantum Mechanics: Concepts and Applications


Nouredine Zettili - 2001
    It combines the essential elements of the theory with the practical applications. Containing many examples and problems with step-by-step solutions, this cleverly structured text assists the reader in mastering the machinery of quantum mechanics. * A comprehensive introduction to the subject * Includes over 65 solved examples integrated throughout the text * Includes over 154 fully solved multipart problems * Offers an indepth treatment of the practical mathematical tools of quantum mechanics * Accessible to teachers as well as students

Blue Team Field Manual (BTFM)


Alan J. White - 2017
    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

Fundamentals of Mathematical Statistics


S.C. Gupta
    Fundamentals Of Mathematical Statistics is written by SC Gupta and VK Kapoor and published by SULTAN CHAND & SONS, Delhi.

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems


Chris Sanders - 2007
    But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.

The Pythagorean Sourcebook and Library


Kenneth Sylvan Guthrie - 1919
    The material of this book is indispensable for anyone who wishes to understand the real spiritual roots of Western civilization.