Book picks similar to
If I Only Changed the Software, Why Is the Phone on Fire?: Embedded Debugging Methods Revealed: Technical Mysteries for Engineers by Lisa K. Simone
programming
non-fiction
testing-software
mystery
Practical Object Oriented Design in Ruby
Sandi Metz - 2012
The Web is awash in Ruby code that is now virtually impossible to change or extend. This text helps you solve that problem by using powerful real-world object-oriented design techniques, which it thoroughly explains using simple and practical Ruby examples. Sandi Metz has distilled a lifetime of conversations and presentations about object-oriented design into a set of Ruby-focused practices for crafting manageable, extensible, and pleasing code. She shows you how to build new applications that can survive success and repair existing applications that have become impossible to change. Each technique is illustrated with extended examples, all downloadable from the companion Web site, poodr.info. The first title to focus squarely on object-oriented Ruby application design,
Practical Object-Oriented Design in Ruby
will guide you to superior outcomes, whatever your previous Ruby experience. Novice Ruby programmers will find specific rules to live by; intermediate Ruby programmers will find valuable principles they can flexibly interpret and apply; and advanced Ruby programmers will find a common language they can use to lead development and guide their colleagues. This guide will help you Understand how object-oriented programming can help you craft Ruby code that is easier to maintain and upgrade Decide what belongs in a single Ruby class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed Ruby code
MH 370: By Accident or Design
Peter Lee - 2014
On the way, he analyses some of the alternative explanations that have been offered, including the conspiracy theories, and looks at the latest information from the Far East.Some recently published works on this subject were rushed into print before the few indisputable facts were known, and many have been based on little more than the author's personal opinion, almost irrespective of these facts, or have been founded on apparently factual information that has since been discredited. This book starts off with no preconceptions at all. The author looks only at the facts of the matter, and has worked out a possible and believable explanation that covers everything we know about this flight from take-off to its ultimate fate. He also explains exactly how the aircraft systems - things like SSR, ACARS and ADS-B - work, and provides an overview of the satellite communications system that was able to provide basic tracking data for the aircraft long after voice communications ceased.He explains the crucial significance of the position where the aircraft vanished from Malaysia's radar screens, and why that precise location was chosen by the perpetrator of this disappearance. And he shows why the route that the aircraft subsequently followed was not accidental, but entirely deliberate, and chosen for one very specific reason.He concludes his analysis by explaining approximately where the aircraft is now, and why no confirmed wreckage from the aircraft has been found anywhere.As a military controller, Peter Lee has previously been involved in aircraft accident and investigation procedures as apart of his job. He was solely responsible for deducing the precise reason, and specific sequence of events, that led to the loss of a Royal Navy Sea Harrier in the North Irish Sea some years ago, an event that at first sight appeared completely inexplicable, and was the principal expert witness at the subsequent Board of Inquiry. In the case of flight MH 370, he has turned that same critical eye on this disappearance, and his suggested explanation for what happened is both logical and believable.If you read no other book about this mystery, read this one.
Onboard UFO Encounters: True Accounts of Contact with Extraterrestrials
Preston Dennett - 2020
SUNBURST and LUMINARY - An Apollo Memoir
Don Eyles - 2018
His assignment is to program the complex lunar landing phase in the Lunar Module's onboard computer. As he masters his art the reader learns about the computer, the mission, and a bit about spacecraft navigation and meets a cast of interesting characters along the way. As Apollo 11 approaches, the author flies lunar landings in simulators and meets the astronauts who will fly the LM for real. He explains the computer alarms that almost prevented Neil Armstrong from landing and describes a narrow escape from another dangerous problem. He helps Pete Conrad achieve a pinpoint landing on Apollo 12, and works with Apollo 16 commander John Young on a technique for landing even more precisely. On Apollo 14 he devises a workaround when a faulty pushbutton threatens Alan Shepard's mission, earning a NASA award, a story in Rolling Stone, and a few lines in the history books. Along the way the author hits the high points of his eclectic personal life, as he enters adulthood in the 1960s. He writes for students of the Apollo project, for whom the development of the flight software is still largely unexplored territory, but also for the young coders of the current digital culture, who will get the author's observations on the art of programming and who may identify as he explores sex, drugs, and the other excitements of the era. The underlying thesis is that the American space program in the 1960s was successful not in spite of, but in large measure because of the idealism, the freedom of thought, and the sense of exploration, inner and outer, that prevailed in the culture during that period. The memoir concludes in a party atmosphere at the spectacular night launch of Apollo 17 before a glittery crowd an occasion that marked the high water mark, so far, of human space exploration.
An Introduction to APIs
Brian Cooksey - 2016
We start off easy, defining some of the tech lingo you may have heard before, but didn’t fully understand. From there, each lesson introduces something new, slowly building up to the point where you are confident about what an API is and, for the brave, could actually take a stab at using one.
Bigfoot: Never Before Covered True and New Bigfoot Encounters
Robert Sullivan - 2018
I'm sure you'll enjoy my presentation of these peoples terrifying Bigfoot experiences, as I poured my heart and soul into each and every word, something I'm sure you'll feel by the time you turn the last page.I took great care for this book to feel like a journey, not just across space but time as well. From ghost towns in the Wild West that hold dark secrets, to the deep woods of Khairup and the coldness of the Antarctic, one message rings true; No matter where you are, there's always a chance. Always a chance...Now let's head to Cold War Russia.
Web Hacking 101
Peter Yaworski
With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.
Programming Arduino Next Steps: Going Further with Sketches
Simon Monk - 2013
Featuring coverage of the Arduino Uno, Leonardo, and Due boards, Programming Arduino Next Steps: Going Further with Sketches shows you how to use interrupts, manage memory, program for the Internet, maximize serial communications, perform digital signal processing, and much more. All of the 75+ example sketches featured in the book are available for download.Learn advanced Arduino programming techniques, including how to:Use hardware and timer interruptsBoost performance and speed by writing time-efficient sketchesMinimize power consumption and memory usageInterface with different types of serial busses, including I2C, 1-Wire, SPI, and TTL SerialUse Arduino with USB, including the keyboard and mouse emulation features of the Leonardo and Due boardsProgram Arduino for the InternetPerform digital signal processingAccomplish more than one task at a time--without multi-threadingCreate and release your own code library
The Sophie Lancaster Story
Catherine Smyth - 2016
The beatings and subsequent murder made international news. This book was written by an investigative journalist who became extremely close to the families of the victims. WITH PHOTOS
Gone, Just Gone: Thirteen Baffling Disappearances
Harry M. Bobonich - 2015
We bring you some cases you may have heard of, but others that will be new to you. A Pennsylvania DA goes for a drive and doesn’t return, years later he’s found to have passed on the early prosecution of some involved in the Penn State molestation scandal. Two young lovers in the 1970’s head off for an iconic rock festival and are never seen again—their classmates still wonder. The man behind the most important civil rights case before the landmark Brown decision steps into a cold rainy Chicago night and vanishes. A beautiful, but troubled, young Indian doctor goes missing in New York City on 9/11—or was it the night before? One of the richest and most unscrupulous men in the world falls out a small plane filled with his associates--or at least that was their story. Only one cadet in the history of West Point has gone missing and never been found—where in the world did Richard Cox go? As a bonus, you’ll read of people who went missing only to eventually turn up in the most unusual places.
Agile Data Warehouse Design: Collaborative Dimensional Modeling, from Whiteboard to Star Schema
Lawrence Corr - 2011
This book describes BEAM✲, an agile approach to dimensional modeling, for improving communication between data warehouse designers, BI stakeholders and the whole DW/BI development team. BEAM✲ provides tools and techniques that will encourage DW/BI designers and developers to move away from their keyboards and entity relationship based tools and model interactively with their colleagues. The result is everyone thinks dimensionally from the outset! Developers understand how to efficiently implement dimensional modeling solutions. Business stakeholders feel ownership of the data warehouse they have created, and can already imagine how they will use it to answer their business questions. Within this book, you will learn: ✲ Agile dimensional modeling using Business Event Analysis & Modeling (BEAM✲) ✲ Modelstorming: data modeling that is quicker, more inclusive, more productive, and frankly more fun! ✲ Telling dimensional data stories using the 7Ws (who, what, when, where, how many, why and how) ✲ Modeling by example not abstraction; using data story themes, not crow's feet, to describe detail ✲ Storyboarding the data warehouse to discover conformed dimensions and plan iterative development ✲ Visual modeling: sketching timelines, charts and grids to model complex process measurement - simply ✲ Agile design documentation: enhancing star schemas with BEAM✲ dimensional shorthand notation ✲ Solving difficult DW/BI performance and usability problems with proven dimensional design patterns Lawrence Corr is a data warehouse designer and educator. As Principal of DecisionOne Consulting, he helps clients to review and simplify their data warehouse designs, and advises vendors on visual data modeling techniques. He regularly teaches agile dimensional modeling courses worldwide and has taught dimensional DW/BI skills to thousands of students. Jim Stagnitto is a data warehouse and master data management architect specializing in the healthcare, financial services, and information service industries. He is the founder of the data warehousing and data mining consulting firm Llumino.
Linux Administration Handbook
Evi Nemeth - 2006
Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments. It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.) There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years. Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics." Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 href="http://www.barnesandnoble.com/newslet... Only
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Scott Rosenberg - 2007
Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving—and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous ‘mythical man-month’ to Extreme Programming. Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.
Learning jQuery
Jonathan Chaffer - 2007
Once you have thoroughly covered the basics, the book returns to each concept to cover more advanced examples and techniques. This book is for web designers who want to create interactive elements for their designs, and for developers who want to create the best user interface for their web applications. Basic JavaScript programming and knowledge of HTML and CSS is required. No knowledge of jQuery is assumed, nor is experience with any other JavaScript libraries.
Introducing Elixir: Getting Started in Functional Programming
Simon St.Laurent - 2013
If you're new to Elixir, its functional style can seem difficult, but with help from this hands-on introduction, you'll scale the learning curve and discover how enjoyable, powerful, and fun this language can be. Elixir combines the robust functional programming of Erlang with an approach that looks more like Ruby and reaches toward metaprogramming with powerful macro features.Authors Simon St. Laurent and J. David Eisenberg show you how to write simple Elixir programs by teaching you one skill at a time. You’ll learn about pattern matching, recursion, message passing, process-oriented programming, and establishing pathways for data rather than telling it where to go. By the end of your journey, you’ll understand why Elixir is ideal for concurrency and resilience.* Get comfortable with IEx, Elixir's command line interface* Become familiar with Elixir’s basic structures by working with numbers* Discover atoms, pattern matching, and guards: the foundations of your program structure* Delve into the heart of Elixir processing with recursion, strings, lists, and higher-order functions* Create processes, send messages among them, and apply pattern matching to incoming messages* Store and manipulate structured data with Erlang Term * Storage (ETS) and the Mnesia database* Build resilient applications with the Open Telecom Platform (OTP)* Define macros with Elixir's meta-programming tools.