Book picks similar to
The Book of Inkscape: The Definitive Guide to the Free Graphics Editor by Dmitry Kirsanov
reference
non-fiction
graphics
ebook
Flask Web Development: Developing Web Applications with Python
Miguel Grinberg - 2014
With this hands-on book, you’ll learn Flask from the ground up by developing a complete social blogging application step-by-step. Author Miguel Grinberg walks you through the framework’s core functionality, and shows you how to extend applications with advanced web techniques such as database migration and web service communication.Rather than impose development guidelines as other frameworks do, Flask leaves the business of extensions up to you. If you have Python experience, this book shows you how to take advantage of that creative freedom.- Learn Flask’s basic application structure and write an example app- Work with must-have components—templates, databases, web forms, and email support- Use packages and modules to structure a large application that scales- Implement user authentication, roles, and profiles- Build a blogging feature by reusing templates, paginating item lists, and working with rich text- Use a Flask-based RESTful API to expose app functionality to smartphones, tablets, and other third-party clients- Learn how to run unit tests and enhance application performance- Explore options for deploying your web app to a production server
Clojure Programming
Chas Emerick - 2011
This book helps you learn the fundamentals of Clojure with examples relating it to the languages you know already, in the domains and topics you work with every day. See how this JVM language can help eliminate unnecessary complexity from your programming practice and open up new options for solving the most challenging problems. Clojure Programming demonstrates the language's flexibility by showing how it can be used for common tasks like web programming and working with databases, up through more demanding applications that require safe, effective concurrency and parallelism, data and statistical analysis, and more. This in-depth look helps tie together the full Clojure development experience, from how to organize your project and an introduction to Clojure build tooling, to a tutorial on how to make the most of Clojure’s REPL during development, and how to deploy your finished application in a cloud environment.Learn how to use Clojure without losing your investment in the Java platform Understand the advantages of Clojure as an efficient Lisp for the JVM See how Clojure is used today in several practical domains Discover how Clojure eliminates the need for many verbose and complicated design patterns Deploy large web applications across tens or hundreds of cloud nodes with Clojure
Getting Started with OAuth 2.0
Ryan Boyd - 2011
This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system
Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners
Chris Dannen - 2017
Blockchain protocols are taking the world by storm, and the Ethereum project, with its Turing-complete scripting language Solidity, has rapidly become a front-runner. This book presents the blockchain phenomenon in context; then situates Ethereum in a world pioneered by Bitcoin.See why professionals and non-professionals alike are honing their skills in smart contract patterns and distributed application development. You'll review the fundamentals of programming and networking, alongside its introduction to the new discipline of crypto-economics. You'll then deploy smart contracts of your own, and learn how they can serve as a back-end for JavaScript and HTML applications on the Web.Many Solidity tutorials out there today have the same flaw: they are written for "advanced" JavaScript developers who want to transfer their skills to a blockchain environment. Introducing Ethereum and Solidity is accessible to technology professionals and enthusiasts of all levels. You'll find exciting sample code that can move forward real world assets in both the academic and the corporate arenas. Find out now why this book is a powerful gateway for creative technologists of all types, from concept to deployment.What You'll LearnSee how Ethereum (and other cryptocurrencies) workCompare distributed apps (dapps) to web appsWrite Ethereum smart contracts in Solidity Connect Ethereum smart contracts to your HTML/CSS/JavaScript web applicationsDeploy your own dapp, coin, and blockchainWork with basic and intermediate smart contractsWho This Book Is For Anyone who is curious about Ethereum or has some familiarity with computer science Product managers, CTOs, and experienced JavaScript programmersExperts will find the advanced sample projects in this book rewarding because of the power of Solidity
Podcasting For Dummies
Tee Morris - 2005
You can podcast to boost your business, promote your passion, share your opinions, or just have fun. The point is to say what you want to say to those who want to hear it. With step-by-step explanations, screen shots, and tons of examples, this guide clues you in on recording, producing, and hosting your very own podcast with info on:Finding your voice and your niche, whether you want to talk tech, make your own kinds of music, educate listeners, make people laugh, do soundseeing tours, serialize your novel, or invent a new podcasting genre Getting the bare necessities (if you don't already have them), including a microphone, recording software, and an audio card Audio editing software such as Audacity, Cakewalk for PCs, GarageBand for musicality, and Audio HiJack Pro for Macs Recording, including understanding dB (decibel levels), capturing or minimizing ambient noise, and more Editing with GarageBand or Audacity, adding bed music, and including intros and outros for a signature finishing touch You want your podcast to be heard. Podcasting For Dummies helps you launch and promote it with info on how to:Downsize your audio files with MP3 compression Change bit rates and sample rates in Audacity and iTunes Create and edit your ID3 tags in Audacity or iTunes Post your show notes using Movable Type or Libsyn Simplify the RSS 2.0 feed by using blogging software or a podcast-hosting company such as Audioblog.com, Podcastamatic, and Feeder Ping for publicity Communicate with your listeners on your blog, through online discussion groups such as Yahoo! Groups or Google Groups, or on online forums Of course, if you want to be a podcatcher (a listener) and subscribe to podcasts, this guide shows you how to do that, too! Complete with a companion podcast--a free weekly audio commentary that will keep you up to speed on the podsphere--this guide helps you get your message heard, loud and clear.
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson - 2017
You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
Embedded Android: Porting, Extending, and Customizing
Karim Yaghmour - 2011
You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.
Test-Driven Web Development with Python
Harry Percival - 2010
You’ll learn everything from the basics of database integration and the use of JavaScript to browser-automation tools like Selenium, and advanced topics such as NoSQL, Web Sockets, and async programming.Ideal for beginners, this book teaches a development methodology that leads to peace of mind, cleaner code, and better web apps.
The Linux Command Line
William E. Shotts Jr. - 2012
Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction
The Manga Guide to Physics
Hideo Nitta - 2009
And she can't concentrate on her tennis matches when she's worried about the questions she missed on the big test! Luckily for her, she befriends Ryota, a patient physics geek who uses real-world examples to help her understand classical mechanics-and improve her tennis game in the process!In The Manga Guide to Physics, you'll follow alongside Megumi as she learns about the physics of everyday objects like roller skates, slingshots, braking cars, and tennis serves. In no time, you'll master tough concepts like momentum and impulse, parabolic motion, and the relationship between force, mass, and acceleration.You'll also learn how to:Apply Newton's three laws of motion to real-life problems Determine how objects will move after a collision Draw vector diagrams and simplify complex problems using trigonometry Calculate how an object's kinetic energy changes as its potential energy increases If you're mystified by the basics of physics or you just need a refresher, The Manga Guide to Physics will get you up to speed in a lively, quirky, and practical way.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Mac OS X Leopard: The Missing Manual
David Pogue - 2007
The new Mac OS X 10.5, better known as Leopard, is faster than its predecessors, but nothing's too fast for Pogue and this Missing Manual. It's just one of reasons this is the most popular computer book of all time.Mac OS X: The Missing Manual, Leopard Edition is the authoritative book for Mac users of all technical levels and experience. If you're new to the Mac, this book gives you a crystal-clear, jargon-free introduction to the Dock, the Mac OS X folder structure, and the Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, and a tutorial for Safari, Mac's web browser. This Missing Manual is amusing and fun to read, but Pogue doesn't take his subject lightly. Which new Leopard features work well and which do not? What should you look for? What should you avoid? Mac OS X: The Missing Manual, Leopard Edition offers an objective and straightforward instruction for using:Leopard's totally revamped Finder Spaces to group your windows and organize your Mac tasks Quick Look to view files before you open them The Time Machine, Leopard's new backup feature Spotlight to search for and find anything in your Mac Front Row, a new way to enjoy music, photos, and videos Enhanced Parental Controls that come with Leopard Quick tips for setting up and configuring your Mac to make it your own There's something new on practically every page of this new edition, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and Mac OS X: The Missing Manual, Leopard Edition is a great new way to tame it.
The LEGO MINDSTORMS EV3 Discovery Book: A Beginner's Guide to Building and Programming Robots
Laurens Valk - 2014
This full color book teaches you fundamental programming and robotics skills as you build and program powerful robots that move, monitor sensors, and respond to their environments. You will build seven increasingly sophisticated robots like the BRICK SORT3R (a robot that sorts bricks by color and size), the THE SNATCH3R (an autonomous robotic arm), and LAVA R3X (a humanoid that walks and talks). Valk also covers more advanced programming techniques like data wires and variables, and shows you how to create custom remote control programs. More than 100 building and programming challenges throughout encourage you to think creatively and to apply what you've learned to invent your own robots.
Bayesian Statistics the Fun Way: Understanding Statistics and Probability with Star Wars, Lego, and Rubber Ducks
Will Kurt - 2019
But many people use data in ways they don't even understand, meaning they aren't getting the most from it. Bayesian Statistics the Fun Way will change that.This book will give you a complete understanding of Bayesian statistics through simple explanations and un-boring examples. Find out the probability of UFOs landing in your garden, how likely Han Solo is to survive a flight through an asteroid shower, how to win an argument about conspiracy theories, and whether a burglary really was a burglary, to name a few examples.By using these off-the-beaten-track examples, the author actually makes learning statistics fun. And you'll learn real skills, like how to:- How to measure your own level of uncertainty in a conclusion or belief- Calculate Bayes theorem and understand what it's useful for- Find the posterior, likelihood, and prior to check the accuracy of your conclusions- Calculate distributions to see the range of your data- Compare hypotheses and draw reliable conclusions from themNext time you find yourself with a sheaf of survey results and no idea what to do with them, turn to Bayesian Statistics the Fun Way to get the most value from your data.