Discrete Mathematical Structures with Applications to Computer Science


Jean-Paul Tremblay - 1975
    

Algorithms


Sanjoy Dasgupta - 2006
    Emphasis is placed on understanding the crisp mathematical idea behind each algorithm, in a manner that is intuitive and rigorous without being unduly formal. Features include: The use of boxes to strengthen the narrative: pieces that provide historical context, descriptions of how the algorithms are used in practice, and excursions for the mathematically sophisticated.Carefully chosen advanced topics that can be skipped in a standard one-semester course, but can be covered in an advanced algorithms course or in a more leisurely two-semester sequence.An accessible treatment of linear programming introduces students to one of the greatest achievements in algorithms. An optional chapter on the quantum algorithm for factoring provides a unique peephole into this exciting topic. In addition to the text, DasGupta also offers a Solutions Manual, which is available on the Online Learning Center.Algorithms is an outstanding undergraduate text, equally informed by the historical roots and contemporary applications of its subject. Like a captivating novel, it is a joy to read. Tim Roughgarden Stanford University

Machine Learning for Hackers


Drew Conway - 2012
    Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyze sample datasets and write simple machine learning algorithms. "Machine Learning for Hackers" is ideal for programmers from any background, including business, government, and academic research.Develop a naive Bayesian classifier to determine if an email is spam, based only on its textUse linear regression to predict the number of page views for the top 1,000 websitesLearn optimization techniques by attempting to break a simple letter cipherCompare and contrast U.S. Senators statistically, based on their voting recordsBuild a "whom to follow" recommendation system from Twitter data

Elements of Information Theory


Thomas M. Cover - 1991
    Readers are provided once again with an instructive mix of mathematics, physics, statistics, and information theory.All the essential topics in information theory are covered in detail, including entropy, data compression, channel capacity, rate distortion, network information theory, and hypothesis testing. The authors provide readers with a solid understanding of the underlying theory and applications. Problem sets and a telegraphic summary at the end of each chapter further assist readers. The historical notes that follow each chapter recap the main points.The Second Edition features: * Chapters reorganized to improve teaching * 200 new problems * New material on source coding, portfolio theory, and feedback capacity * Updated referencesNow current and enhanced, the Second Edition of Elements of Information Theory remains the ideal textbook for upper-level undergraduate and graduate courses in electrical engineering, statistics, and telecommunications.

The Joy of x: A Guided Tour of Math, from One to Infinity


Steven H. Strogatz - 2012
    do it? How should you flip your mattress to get the maximum wear out of it? How does Google search the Internet? How many people should you date before settling down? Believe it or not, math plays a crucial role in answering all of these questions and more.Math underpins everything in the cosmos, including us, yet too few of us understand this universal language well enough to revel in its wisdom, its beauty — and its joy. This deeply enlightening, vastly entertaining volume translates math in a way that is at once intelligible and thrilling. Each trenchant chapter of The Joy of x offers an “aha!” moment, starting with why numbers are so helpful, and progressing through the wondrous truths implicit in π, the Pythagorean theorem, irrational numbers, fat tails, even the rigors and surprising charms of calculus. Showing why he has won awards as a professor at Cornell and garnered extensive praise for his articles about math for the New York Times, Strogatz presumes of his readers only curiosity and common sense. And he rewards them with clear, ingenious, and often funny explanations of the most vital and exciting principles of his discipline.Whether you aced integral calculus or aren’t sure what an integer is, you’ll find profound wisdom and persistent delight in The Joy of x.

Psychology: From Inquiry to Understanding


Scott O. Lilienfeld - 2007
    By encouraging students to question, and teaching students how to test their assumptions, Lilienfeld motivates students to use scientific thinking skills to better understand the complex world of psychology.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Gravity: An Introduction to Einstein's General Relativity


James B. Hartle - 2002
    Using a "physics first" approach to the subject, renowned relativist James B. Hartle provides a fluent and accessible introduction that uses a minimum of new mathematics and is illustrated with a wealth of exciting applications. KEY TOPICS: The emphasis is on the exciting phenomena of gravitational physics and the growing connection between theory and observation. The Global Positioning System, black holes, X-ray sources, pulsars, quasars, gravitational waves, the Big Bang, and the large scale structure of the universe are used to illustrate the widespread role of how general relativity describes a wealth of everyday and exotic phenomena. MARKET: For anyone interested in physics or general relativity.

Algorithm Design


Jon Kleinberg - 2005
    The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science.

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

An Introduction to Probability and Inductive Logic


Ian Hacking - 2001
    The book has been designed to offer maximal accessibility to the widest range of students (not only those majoring in philosophy) and assumes no formal training in elementary symbolic logic. It offers a comprehensive course covering all basic definitions of induction and probability, and considers such topics as decision theory, Bayesianism, frequency ideas, and the philosophical problem of induction. The key features of the book are: * A lively and vigorous prose style* Lucid and systematic organization and presentation of the ideas* Many practical applications* A rich supply of exercises drawing on examples from such fields as psychology, ecology, economics, bioethics, engineering, and political science* Numerous brief historical accounts of how fundamental ideas of probability and induction developed.* A full bibliography of further reading Although designed primarily for courses in philosophy, the book could certainly be read and enjoyed by those in the social sciences (particularly psychology, economics, political science and sociology) or medical sciences such as epidemiology seeking a reader-friendly account of the basic ideas of probability and induction. Ian Hacking is University Professor, University of Toronto. He is Fellow of the Royal Society of Canada, Fellow of the British Academy, and Fellow of the American Academy of Arts and Sciences. he is author of many books including five previous books with Cambridge (The Logic of Statistical Inference, Why Does Language Matter to Philosophy?, The Emergence of Probability, Representing and Intervening, and The Taming of Chance).

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Networking for Systems Administrators (IT Mastery Book 5)


Michael W. Lucas - 2015
    Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.

Speedsolving the Cube: Easy-to-Follow, Step-by-Step Instructions for Many Popular 3-D Puzzles


Dan Harris - 2008
    Here, complete with detailed illustrations and basic as well as advanced solving techniques, is the ultimate speedcuber’s guide. It not only gives the solution to the familiar 3x3x3 cube (which has 43,252,003,274,489,856,000—that’s 43 quintillion—possible positions), but also the 2x2x2, 4x4x4, and staggeringly difficult 5x5x5 puzzles. With millions of cubes out there and countless would-be champions looking for tips to improve their times, this is the definitive manual for this unique sport.

The Adobe Photoshop Layers Book


Matt Kloskowski - 2008
    From working with and managing multiple layers to using layers to enhance and retouch photos, this Photoshop guru covers it all.