Book picks similar to
Effective Software Maintenance and Evolution: A Reuse-Based Approach by Stanislaw Jarzabek
all
computer
maintenance
programming
LISP in Small Pieces
Christian Queinnec - 1996
It describes 11 interpreters and 2 compilers, including very recent techniques of interpretation and compilation. The book is in two parts. The first starts from a simple evaluation function and enriches it with multiple name spaces, continuations and side-effects with commented variants, while at the same time the language used to define these features is reduced to a simple lambda-calculus. Denotational semantics is then naturally introduced. The second part focuses more on implementation techniques and discusses precompilation for fast interpretation: threaded code or bytecode; compilation towards C. Some extensions are also described such as dynamic evaluation, reflection, macros and objects. This will become the new standard reference for people wanting to know more about the Lisp family of languages: how they work, how they are implemented, what their variants are and why such variants exist. The full code is supplied (and also available over the Net). A large bibliography is given as well as a considerable number of exercises. Thus it may also be used by students to accompany second courses on Lisp or Scheme.
In the Beginning...Was the Command Line
Neal Stephenson - 1999
And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.
Professional Excel Development: The Definitive Guide to Developing Applications Using Microsoft Excel and VBA
Stephen Bullen - 2005
It has become adevelopment platform in it own right. Applications written using Excel are partof many corporations' core suites of business-critical applications. In spite ofthis, Excel is too often thought of as a hobbyist's platform. While there arenumerous titles on Excel and VBA, until now there have been none thatprovide an overall explanation of how to develop professional-quality Excel-basedapplications. All three authors are professional Excel developers who runtheir own companies developing Excel-based apps for clients ranging fromindividuals to the largest multinational corporations. In this book they showhow anyone from power users to professional developers can increase thespeed and usefulness of their Excel-based apps.
The Boy Next Door
Melanie Marks - 2017
He’d been my everything—first my best friend, then my boyfriend … then my total enemy. Unfortunately, my heart still longs for him, but sadly so does every other girls’ at our high school. I should stay away from him, definitely; but once he starts inexplicably talking to me again, he makes it hard. In fact, he makes it impossible. And impossible for me to get together with the guy I’m pretty sure I’m meant to be with. He’s doing everything he can to keep us apart. What’s up with that??? *Standalone teen romance No swearing No book needs to be read before or after this book This story is a three-hour read (four at the most) By Melanie Marks, author of His Kiss; and When You Noticed Me This book also includes another romantic teen story by Melanie Marks. It is called “Getting Lucky (Hey, That’s His Name).” That story is a two-hour read. Melanie Marks newest books: *When You Noticed Me *Jane’s Air *Kissing The Bad Boy They are all available in unlimited (or the regular way, each for a buck) Notes about this book: Teen Romance; No Swearing; Happily Ever After; Romantic Comedy; Standalone Romance
The October People (Gulf Coast Paranormal Extra Book 1)
M.L. Bullock - 2018
Will her time at the haunted Leaf Academy change all that?
Award-winning photographer Jocelyn Graves gets an invitation to document the Leaf Academy, but she may get more than she bargained for in this spooky location. There's music coming from the rotting auditorium, doppelgangers have made an appearance, and there is a ghost boy who haunts the place. But is he a forgotten victim, or is he really a negative entity masquerading as a sad child? There's a mysterious saying carved into the stone above the door, and Jocelyn discovers black feathers in strange locations. The Leaf Academy is a puzzle Jocelyn needs an answer to--before the sun comes up. The photographer is about to get the shock of her life and meet an entity she will never forget. Although she will wish she could.
The October People is a Gulf Coast Paranormal Extra and a standalone novella.
Read all the Gulf Coast Paranormal books and meet the entire paranormal investigation team. Gulf Coast Paranormal Series
The Ghosts of Kali Oka Road
The Ghosts of the Crescent Theater
A Haunting on Bloodgood Row
And so many more!
Scroll up and grab your copy of THE OCTOBER PEOPLE!
The Other: Encounters With The Cthulhu Mythos Book Two
Troy Young - 2020
Concurrency in Go: Tools and Techniques for Developers
Katherine Cox-Buday - 2017
If you're a developer familiar with Go, this practical book demonstrates best practices and patterns to help you incorporate concurrency into your systems.Author Katherine Cox-Buday takes you step-by-step through the process. You'll understand how Go chooses to model concurrency, what issues arise from this model, and how you can compose primitives within this model to solve problems. Learn the skills and tooling you need to confidently write and implement concurrent systems of any size.Understand how Go addresses fundamental problems that make concurrency difficult to do correctlyLearn the key differences between concurrency and parallelismDig into the syntax of Go's memory synchronization primitivesForm patterns with these primitives to write maintainable concurrent codeCompose patterns into a series of practices that enable you to write large, distributed systems that scaleLearn the sophistication behind goroutines and how Go's runtime stitches everything together
Programming Languages: Design and Implementation
Terrence W. Pratt - 1995
The emphasis throughout is on fundamental concepts--readers learn important ideas, not minor language differences--but several languages are highlighted in sufficient detail to enable readers to write programs that demonstrate the relationship between a source program and its execution behavior--e.g., C, C++, JAVA, ML, LISP, Prolog, Smalltalk, Postscript, HTML, PERL, FORTRAN, Ada, COBOL, BASIC SNOBOL4, PL/I, Pascal. Begins with a background review of programming languages and the underlying hardware that will execute the given program; then covers the underlying grammatical model for programming languages and their compilers (elementary data types, data structures and encapsulation, inheritance, statements, procedure invocation, storage management, distributed processing, and network programming). Includes an advanced chapter on language semantics--program verification, denotational semantics, and the lambda calculus. For computer engineers and others interested in programming language designs.
The Guru's Guide to Transact-Sql
Ken Henderson - 2000
Beginners and intermediate developers will appreciate the comprehensive tutorial that walks step-by-step through building a real client/server database, from concept to deployment and beyond -- and points out key pitfalls to avoid throughout the process. Experienced users will appreciate the book's comprehensive coverage of the Transact-SQL language, from basic to advanced level; detailed ODBC database access information; expert coverage of concurrency control, and more. The book includes thorough, up-to-the-minute guidance on building multi-tier applications; SQL Server performance tuning; and other crucial issues for advanced developers. For all database developers, system administrators, and Web application developers who interact with databases in Microsoft-centric environments.
Between
Russell C. Connor - 2017
But when a charred man in a lab coat shows up, the monthly HOA meeting takes a much darker turn.Because the night outside their tiny community center is suddenly full of creatures from the depths of a nightmare. Deformed monsters that seem to come from strange shimmering lights in the woods.Mitch and his band of feuding neighbors must face down this horde if they want to survive...that is, if they can keep from killing one another first.
Learning UML 2.0: A Pragmatic Introduction to UML
Russ Miles - 2006
Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes learning the newest UML standard, UML 2.0, critical for all software developers--and there isn't a better choice than this clear, step-by-step guide to learning the language."--Richard Mark Soley, Chairman and CEO, OMGIf you're like most software developers, you're building systems that are increasingly complex. Whether you're creating a desktop application or an enterprise system, complexity is the big hairy monster you must manage.The Unified Modeling Language (UML) helps you manage this complexity. Whether you're looking to use UML as a blueprint language, a sketch tool, or as a programming language, this book will give you the need-to-know information on how to apply UML to your project. While there are plenty of books available that describe UML, Learning UML 2.0 will show you how to use it. Topics covered include:Capturing your system's requirements in your model to help you ensure that your designs meet your users' needsModeling the parts of your system and their relationshipsModeling how the parts of your system work together to meet your system's requirementsModeling how your system moves into the real world, capturing how your system will be deployedEngaging and accessible, this book shows you how to use UML to craft and communicate your project's design. Russ Miles and Kim Hamilton have written a pragmatic introduction to UML based on hard-earned practice, not theory. Regardless of the software process or methodology you use, this book is the one source you need to get up and running with UML 2.0.Russ Miles is a software engineer for General Dynamics UK, where he works with Java and Distributed Systems, although his passion at the moment is Aspect Orientation and, in particular, AspectJ. Kim Hamilton is a senior software engineer at Northrop Grumman, where she's designed and implemented a variety of systems including web applications and distributed systems, with frequent detours into algorithms development.
Beginning Programming for Dummies [With CDROM]
Wallace Wang - 1999
It explores the common parts of every computer programming language and how to write for multiple platforms like Windows, Mac OS X, or Linux. This easily accessible guide provides you with the tools you need to: Create programs and divide them into subprogramsDevelop variables and use constantsManipulate strings and convert them into numbersUse an array as storage spaceReuse and rewrite codeIsolate dataCreate a user interfaceWrite programs for the InternetUtilize JavaScript and Java AppletsIn addition to these essential building blocks, this guide features a companion CD-ROM containing Liberty BASIC compiler and code in several languages. It also provides valuable programming resources and lets you in on cool careers for programmers. With "Beginning Programming of Dummies," you can take charge of your computer and begin programming today
Getting Started with SQL: A Hands-On Approach for Beginners
Thomas Nield - 2016
If you're a business or IT professional, this short hands-on guide teaches you how to pull and transform data with SQL in significant ways. You will quickly master the fundamentals of SQL and learn how to create your own databases.Author Thomas Nield provides exercises throughout the book to help you practice your newfound SQL skills at home, without having to use a database server environment. Not only will you learn how to use key SQL statements to find and manipulate your data, but you'll also discover how to efficiently design and manage databases to meet your needs.You'll also learn how to:Explore relational databases, including lightweight and centralized modelsUse SQLite and SQLiteStudio to create lightweight databases in minutesQuery and transform data in meaningful ways by using SELECT, WHERE, GROUP BY, and ORDER BYJoin tables to get a more complete view of your business dataBuild your own tables and centralized databases by using normalized design principlesManage data by learning how to INSERT, DELETE, and UPDATE records
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks