Book picks similar to
Software Solutions in C by Dale Schumacher


might-read
programming
programming-c
programming-cpp

The Godfather Papers and Other Confessions


Mario Puzo - 1972
    

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

617 Squadron: The Dambusters at War (Memoirs from World War Two)


Tom Bennett - 1986
    

Foundations of Statistical Natural Language Processing


Christopher D. Manning - 1999
    This foundational text is the first comprehensive introduction to statistical natural language processing (NLP) to appear. The book contains all the theory and algorithms needed for building NLP tools. It provides broad but rigorous coverage of mathematical and linguistic foundations, as well as detailed discussion of statistical methods, allowing students and researchers to construct their own implementations. The book covers collocation finding, word sense disambiguation, probabilistic parsing, information retrieval, and other applications.

Conceptual Mathematics: A First Introduction to Categories


F. William Lawvere - 1997
    Written by two of the best-known names in categorical logic, Conceptual Mathematics is the first book to apply categories to the most elementary mathematics. It thus serves two purposes: first, to provide a key to mathematics for the general reader or beginning student; and second, to furnish an easy introduction to categories for computer scientists, logicians, physicists, and linguists who want to gain some familiarity with the categorical method without initially committing themselves to extended study.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Handbook of Applied Cryptography


Alfred J. Menezes - 1996
    Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

Ubuntu: The Beginner's Guide


Jonathan Moeller - 2011
     In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.

True Crime Stories Volume 2: 12 Terrifying True Crime Murder Cases (List of Twelve)


Ryan Becker - 2017
     From Blaine Norris and Ryan Trimble, who conspired to commit bloody murder for the sake of a film, to James Edward Pough who became a mass shooter after his car was repossessed, it is a frightening yet fascinating look at the sometimes-trivial things which set people onto a path of brutal killing and terror. Each one made their darkest fantasies into a reality when they made the decision to kill and each one has earned their own terrible place in this gruesome hall of fame. Get a copy of List of Twelve: Volume 2 and be prepared for an insight into the darkest recesses of dangerous minds like no other book before it.

Advanced Apex Programming for Salesforce.com and Force.com


Dan Appleman - 2012
    Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.

Programming in C


Reema Thareja - 2011
    Comprehensive in its coverage, the book focuses on the fundamentals to build a strong foundation of how to write effective C programs.

Celia's Puppies


Claudia Hall Christian - 2009
    Over the course of her life, she gathered those who needed her special brand of love. Nine years after her death, Celia's puppies are facing themselves and their lives. Exciting, heart-warming, and always fun, Celia's Puppies is the second installment of the Denver Cereal. An Internet sensation, Denver Cereal is a serial fiction grounded in Uptown Denver, Colorado. "I am completely addicted to this series." - P. Cooper "Claudia Hall Christian brings life to each of these characters, a life that you long to be a part of, that you just can't get enough of." - C. Sund "I love Denver Cereal." - L. Richards Crunchy, sweet and always addicting - you deserve a little Denver Cereal in your life. DenverCereal.com

Her Damaged Protector (Alpha Ever After #3)


Kelli Walker - 2020
    To forget my wife and unborn son were dead. But then I found Savannah. The moment I met her I knew—she was running from something. She was broken like me, hiding behind fear and sadness. The moment I tasted her I knew she was mine. I shouldn’t have let myself fall for her, I shouldn’t have let her five year old son burrow into my cold, dead heart. She deserves a world I can’t give her. But I’m a greedy bastard. Instead of walking away I claimed her in more ways than I can count. She warned me to stay away, She told me she didn’t need saving. Now the shadows she’s trying to outrun have caught up to her, And I’ll do everything I can to keep her and her son safe. Even it means I have to lose everything again in the process. Read as part of this series or as a stand-alone book. No Cliffhangers and a HEA!

Minecraft For Dummies


Jacob Cordeiro - 2013
    With this fun and friendly beginners guide, you will quickly grasp how to play Minecraft in the three modes of game play: survival, creative, and hardcore. The easy-to-understand writing style walks you through every step of the way, from downloading the game to choosing a gaming platform to defending your creations against monsters and winning the game by defeating the Ender Dragon. Explains how to use blocks to build amazing creations and engage in gameplay with other players Details techniques for travelling across the biomes Zeroes in on playing wisely in Survival mode so you can acquire resources to maintain your health and hunger Shares tips for playing carefully in Creative mode, using your unlimited supply of resources, the ability to fly, and more Helps you play in Hardcore mode Minecraft For Dummies, Portable Edition goes where you go as you create a world you won't want to leave!

Eternity: God, Soul, New Physics


Trevelyan - 2013
    This is a book about how many of the 'big' philosophical and religious questions that have puzzled mankind for centuries can be answered by recent breakthroughs in science.