Absolute C++


Walter J. Savitch - 2001
    Concepts and techniques are presented in a clear and concise style, giving readers the opportunity to master key topics.

The Algorithm Design Manual


Steven S. Skiena - 1997
    Drawing heavily on the author's own real-world experiences, the book stresses design and analysis. Coverage is divided into two parts, the first being a general guide to techniques for the design and analysis of computer algorithms. The second is a reference section, which includes a catalog of the 75 most important algorithmic problems. By browsing this catalog, readers can quickly identify what the problem they have encountered is called, what is known about it, and how they should proceed if they need to solve it. This book is ideal for the working professional who uses algorithms on a daily basis and has need for a handy reference. This work can also readily be used in an upper-division course or as a student reference guide. THE ALGORITHM DESIGN MANUAL comes with a CD-ROM that contains: * a complete hypertext version of the full printed book. * the source code and URLs for all cited implementations. * over 30 hours of audio lectures on the design and analysis of algorithms are provided, all keyed to on-line lecture notes.

Hadoop in Action


Chuck Lam - 2010
    The intended readers are programmers, architects, and project managers who have to process large amounts of data offline. Hadoop in Action will lead the reader from obtaining a copy of Hadoop to setting it up in a cluster and writing data analytic programs.The book begins by making the basic idea of Hadoop and MapReduce easier to grasp by applying the default Hadoop installation to a few easy-to-follow tasks, such as analyzing changes in word frequency across a body of documents. The book continues through the basic concepts of MapReduce applications developed using Hadoop, including a close look at framework components, use of Hadoop for a variety of data analysis tasks, and numerous examples of Hadoop in action.Hadoop in Action will explain how to use Hadoop and present design patterns and practices of programming MapReduce. MapReduce is a complex idea both conceptually and in its implementation, and Hadoop users are challenged to learn all the knobs and levers for running Hadoop. This book takes you beyond the mechanics of running Hadoop, teaching you to write meaningful programs in a MapReduce framework.This book assumes the reader will have a basic familiarity with Java, as most code examples will be written in Java. Familiarity with basic statistical concepts (e.g. histogram, correlation) will help the reader appreciate the more advanced data processing examples. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Database Processing: Fundamentals, Design, and Implementation


David M. Kroenke - 1983
    This tenth edition reflects the needs of students and assures the development of practical and marketable skills. It helps them learn: how to query data and obtain results, by presenting the SQL Select. It provides a framework to help students learn this material.

Redis in Action


Josiah L. Carlson - 2013
    You'll begin by getting Redis set up properly and then exploring the key-value model. Then, you'll dive into real use cases including simple caching, distributed ad targeting, and more. You'll learn how to scale Redis from small jobs to massive datasets. Experienced developers will appreciate chapters on clustering and internal scripting to make Redis easier to use.About the TechnologyWhen you need near-real-time access to a fast-moving data stream, key-value stores like Redis are the way to go. Redis expands on the key-value pattern by accepting a wide variety of data types, including hashes, strings, lists, and other structures. It provides lightning-fast operations on in-memory datasets, and also makes it easy to persist to disk on the fly. Plus, it's free and open source.About this bookRedis in Action introduces Redis and the key-value model. You'll quickly dive into real use cases including simple caching, distributed ad targeting, and more. You'll learn how to scale Redis from small jobs to massive datasets and discover how to integrate with traditional RDBMS or other NoSQL stores. Experienced developers will appreciate the in-depth chapters on clustering and internal scripting.Written for developers familiar with database concepts. No prior exposure to NoSQL database concepts nor to Redis itself is required. Appropriate for systems administrators comfortable with programming.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideRedis from the ground upPreprocessing real-time dataManaging in-memory datasetsPub/sub and configurationPersisting to diskAbout the AuthorDr. Josiah L. Carlson is a seasoned database professional and an active contributor to the Redis community.Table of ContentsPART 1 GETTING STARTEDGetting to know RedisAnatomy of a Redis web applicationPART 2 CORE CONCEPTSCommands in RedisKeeping data safe and ensuring performanceUsing Redis for application supportApplication components in RedisSearch-based applicationsBuilding a simple social networkPART 3 NEXT STEPSReducing memory useScaling RedisScripting Redis with Lua

CCNA: Cisco Certified Network Associate Study Guide [Exam 640-801]


Todd Lammle - 2000
    This Study Guide was developed to meet the exacting requirements of today's Cisco certification candidates. In addition to the engaging and accessible instructional approach that has earned author Todd Lammle the "Best Study Guide Author" award in CertCities Readers' Choice Awards for two consecutive years, this updated fifth edition provides:In-depth coverage of every CCNA exam objective Expanded IP addressing and subnetting coverage More detailed information on EIGRP and OSPF Leading-edge exam preparation software Authoritative coverage of all exam objectives, including:Network planning & designing Implementation & operation LAN and WAN troubleshooting Communications technology

Mastering Bitcoin: Unlocking Digital Cryptocurrencies


Andreas M. Antonopoulos - 2014
    Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.Bitcoin, the first successful decentralized digital currency, is still in its infancy and it's already spawned a multi-billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides you with the knowledge you need (passion not included).This book includes:A broad introduction to bitcoin--ideal for non-technical users, investors, and business executivesAn explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architectsDetails of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principlesOffshoots of the bitcoin and blockchain inventions, including alternative chains, currencies, and applicationsUser stories, analogies, examples, and code snippets illustrating key technical concepts

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Drugs and Society


Glen R. Hanson - 1995
    Written In An Objective And User-Friendly Manner, This Best-Selling Text Continues To Captivate Students By Incorporating Personal Drug Use And Abuse Experiences And Perspectives Throughout. Statistics And Chapter Content Have Been Revised To Include The Latest Information On Current Topics.

A Tour of C++


Bjarne Stroustrup - 2013
    Bjarne Stroustrup, the designer and original implementer of C++, thoroughly covers the details of this language and its use in his definitive reference, The C++ Programming Language, Fourth Edition. In A Tour of C++ , Stroustrup excerpts the overview chapters from that complete reference, expanding and enhancing them to give an experienced programmer-in just a few hours-a clear idea of what constitutes modern C++. In this concise, self-contained guide, Stroustrup covers most major language features and the major standard-library components-not, of course, in great depth, but to a level that gives programmers a meaningful overview of the language, some key examples, and practical help in getting started. Stroustrup presents the C++ features in the context of the programming styles they support, such as object-oriented and generic programming. His tour is remarkably comprehensive. Coverage begins with the basics, then ranges widely through more advanced topics, including many that are new in C++11, such as move semantics, uniform initialization, lambda expressions, improved containers, random numbers, and concurrency. The tour ends with a discussion of the design and evolution of C++ and the extensions added for C++11. This guide does not aim to teach you how to program (see Stroustrup's Programming: Principles and Practice Using C++ for that); nor will it be the only resource you'll need for C++ mastery (see Stroustrup's The C++ Programming Language, Fourth Edition, for that). If, however, you are a C or C++ programmer wanting greater familiarity with the current C++ language, or a programmer versed in another language wishing to gain an accurate picture of the nature and benefits of modern C++, you can't find a shorter or simpler introduction than this tour provides.

Warlock: Reign of Blood


Edwin McRae - 2018
    He flees from the reiver slavers who are abducting the village’s NPCs, only to have an agonizing encounter with the wrong end of a ranger’s arrow. After trying and failing to log out of this painfully realistic game, Mark decides to take up his sword, embrace his new Warlock character class, and help the ranger rescue her people.The warlock and his hard-nosed ranger are soon joined by a macabre healer, an earth-shaking druid and a talking fortress. But as Mark takes the fight to the reivers, he uncovers an even deadlier threat. Dark magic is spreading into Garland from a long dead city, and the reiver leader has found a way to harness some of that corrupted power for himself.Level by level, spell by spell, Mark must become the warlock that Garland needs before it falls to the corrupted ambitions of a rising tyrant.If you love…Visceral combatLovecraftian monstersAncient ruinsSwords and sorceryCompletely original spells...then Warlock: Reign of Blood is for you!Warlock is Book 1 in the Chasms of Corruption duology.

Effective Java


Joshua Bloch - 2001
    The principal enhancement in Java 8 was the addition of functional programming constructs to Java's object-oriented roots. Java 7, 8, and 9 also introduced language features, such as the try-with-resources statement, the diamond operator for generic types, default and static methods in interfaces, the @SafeVarargs annotation, and modules. New library features include pervasive use of functional interfaces and streams, the java.time package for manipulating dates and times, and numerous minor enhancements such as convenience factory methods for collections. In this new edition of Effective Java, Bloch updates the work to take advantage of these new language and library features, and provides specific best practices for their use. Java's increased support for multiple paradigms increases the need for best-practices advice, and this book delivers. As in previous editions, each chapter consists of several "items," each presented in the form of a short, standalone essay that provides specific advice, insight into Java platform subtleties, and updated code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why. Coverage includes:Updated techniques and best practices on classic topics, including objects, classes, methods, libraries, and generics How to avoid the traps and pitfalls of commonly misunderstood subtleties of the platform Focus on the language and its most fundamental libraries, such as java.lang and java.util

Working Effectively with Legacy Code


Michael C. Feathers - 2004
    This book draws on material Michael created for his renowned Object Mentor seminars, techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include: Understanding the mechanics of software change, adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform, with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structureThis book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes.

The Maxwell Series Boxed Set


S.B. Alexander - 2016
    Now she and her dad have moved across the country to start over in a new town where Lacey has three dreams: to conquer her debilitating PTSD, to play good enough high school baseball to get a scholarship, and to stay alive. Because evidently somebody doesn’t like her family.She’s so not the “popular girl” type--at least not with the popular girls. But she makes male friends easily. Just not with sexy, moody Kade Maxwell. And yet...she’s drawn to him both as a person--a mysterious, yet kind person--and in a blind visceral way she’s never known before, not with her last boy friend, not even with hot quarterback Tyler, whose friendship with her has the cheerleaders sharpening their claws.Once Kade gets over the gun and the shiner (just a misunderstanding!), he doesn't want to let Lacey out of his sight. Because Kade has his own dark past. He and Lacey sense in each other that they've both experienced something too horrible to mention--and yet, each guards his or her own private tragedy like a state secret. Until their carefully constructed walls start to crumble. And then the mutual sparks ignite, creating a bonfire of love, hope, and passion.
DARE TO DREAMS.B. Alexander’s escalating love story takes a suspenseful--yet ever more passionate-- turn as the two embark on much more than a hot, temporary tryst. Despite her own tragedy, Lacey's beauty, determination, and dedication make Kade believe he can dream again--she's the only one who can take him to a perfect place where nothing else matters. Not even trauma-induced migraines, or his long-standing feud with Sullivan and Seever--the numbskulls responsible for putting Kade in jail and one of his triplet brothers in the hospital. And by the way, all the Maxwell boys are searing hot and scary smart, blessed with both brains and muscles…For her part, Lacey longs fiercely for a future with Kade, but her long-term dream of a baseball scholarship must come first, and now there’s something even more immediate—she’s desperate to solve the brutal unsolved murders of her family. Because during a trip back to California, Lacey finds her family may have a dark secret it's kept from her--threatening ties to the mob. And then she finds herself face-to-face with the killer she's dreamed of cornering. 

DARE TO LOVE "I'm a knight in shining armor, I'm Prince Charming on a steed; I am Superman and Rocky, hell I'm all you'll ever need." Thus begins Kelton Maxwell's sarcastic ode to love. An impossibly sexy, cocky, charming college playboy, Kelton's got the world by the balls--and he has absolutely no interest in the trappings of romance--even if he'll admit it's made his big brother happy.

Problems & Solutions In Engineering Mechanics


S.S. Bhavikatti - 2009
    It then provides several well developed solved examples which illustrate the various dimensions of the concept under discussion. A set of practice problems is also included to encourage the student to test his mastery over the subject. The book would serve as an excellent text for both Degree and Diploma students of all engineering disciplines. AMIE candidates would also find it most useful.