The D Programming Language


Andrei Alexandrescu - 2010
    I'm sure you'll find the read rewarding." --From the Foreword by Scott Meyers D is a programming language built to help programmers address the challenges of modern software development. It does so by fostering modules interconnected through precise interfaces, a federation of tightly integrated programming paradigms, language-enforced thread isolation, modular type safety, an efficient memory model, and more. The D Programming Language is an authoritative and comprehensive introduction to D. Reflecting the author's signature style, the writing is casual and conversational, but never at the expense of focus and pre-cision. It covers all aspects of the language (such as expressions, statements, types, functions, contracts, and modules), but it is much more than an enumeration of features. Inside the book you will find In-depth explanations, with idiomatic examples, for all language features How feature groups support major programming paradigms Rationale and best-use advice for each major feature Discussion of cross-cutting issues, such as error handling, contract programming, and concurrency Tables, figures, and "cheat sheets" that serve as a handy quick reference for day-to-day problem solving with D Written for the working programmer, The D Programming Language not only introduces the D language--it presents a compendium of good practices and idioms to help both your coding with D and your coding in general.

Species Unknown: A Novel of The Watch


Dan Carlson - 2019
    Bigger, stronger and more cunning than any other predator in the woods, this murderer has only existed in legends and the nightmares of the few to survive an encounter … until now. Dr. Jake Sanders, world-renowned expert on predators and predatory behavior, is on a quest to find the monster that did far worse than wound him. Deputy Julie Reed, a strong, beautiful and lethal enforcer of justice, fearlessly pursues a violent adversary unaware of the twisted path destiny will lay before her. Simon Standing Elk, a recovering alcoholic well on the road to atoning for past sins until a terrifying encounter that now threatens not only his life, but his soul as well. Three different people. Three very different backgrounds. One secret organization. This is the story of events that brought them together and, if they’re not careful, could destroy them all – or worse.

Operational Excellence Pillar: AWS Well-Architected Framework (AWS Whitepaper)


AWS Whitepapers - 2017
    It provides guidance to help you apply best practices in the design, delivery, and maintenance of AWS environments. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

The Bones of Morden Gray


David Brian - 2020
    A depraved undertaker whose predilections go beyond a desire to resurrect the dead. A murdered girl bonded to the fiend who stole her life. And a desperate son on the verge of discovering a terrible secret about his missing mother…When the dead rise.When perennial slacker Timothy Harker is forced into accepting a job as a junior undertaker, he soon becomes convinced that the building in which he works is haunted. He sets up six friends for a late night visit, planning a series of pranks aimed at terrifying his companions.It’s time to run.It doesn’t take long for them to prove the building is haunted, but there is far more to fear than the unfortunate souls trapped within the borders of Gray, Skies and Toliver.In a house of pain, horror and death, seven friends fight for survival, banding together in order to uncover long-buried secrets, and to reveal the dreadful truth about the bones of Morden Gray.

Language Implementation Patterns: Techniques for Implementing Domain-Specific Languages


Terence Parr - 2009
    Instead of writing code in a general-purpose programming language, you can first build a custom language tailored to make you efficient in a particular domain. The key is understanding the common patterns found across language implementations. Language Design Patterns identifies and condenses the most common design patterns, providing sample implementations of each. The pattern implementations use Java, but the patterns themselves are completely general. Some of the implementations use the well-known ANTLR parser generator, so readers will find this book an excellent source of ANTLR examples as well. But this book will benefit anyone interested in implementing languages, regardless of their tool of choice. Other language implementation books focus on compilers, which you rarely need in your daily life. Instead, Language Design Patterns shows you patterns you can use for all kinds of language applications. You'll learn to create configuration file readers, data readers, model-driven code generators, source-to-source translators, source analyzers, and interpreters. Each chapter groups related design patterns and, in each pattern, you'll get hands-on experience by building a complete sample implementation. By the time you finish the book, you'll know how to solve most common language implementation problems.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information


Andy Greenberg - 2012
    WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.

Fundamentals of Computer Graphics


Peter Shirley - 2002
    It presents the mathematical foundations of computer graphics with a focus on geometric intuition, allowing the programmer to understand and apply those foundations to the development of efficient code. - The fundamental mathematics used in graphics programs - The basics of the graphics pipeline - BSP trees - Ray tracing - Surface shading - Texture mapping Advanced topics include: - Curves and surfaces - Color science - Global illumination - Reflection models - Image-based rendering - Visualization Extensive exercises and references for further reading enhance each chapter. An introduction for novices---a refresher for professionals.