Handbook of Applied Cryptography


Alfred J. Menezes - 1996
    Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

The Godfather Papers and Other Confessions


Mario Puzo - 1972
    

Dynamics of Software Development


Jim McCarthy - 1995
    McCarthy is a software industry veteran and the director of the Microsoft Visual C++ development group.

Robyn Hode


David Pilling - 2013
    The north of the country is wild and lawless, plagued by bands of outlaws and robbers and broken men. There is little justice and less order, and the King's officers struggle to impose their royal master's law.Book One of Robyn Hode tells the story of Robert Hode, a yeoman farmer and petty thief, forced to flee into the forests of Yorkshire after defending his home and family against the malice of Sir Gui de Gisburne. Hunted like an animal through the woods, he falls into the company of Hobbe of Wetherby, a notorious murderer and the most wanted felon in the north. Robert must rely on his all his courage and skill to survive and avoid ending as crowbait on the gallows.Mingling fact with fiction, and drawing heavily on surviving contemporary records, "Robyn Hode" is a tough and unsqueamish tale and like no other version of the ancient legend.

Building Java Programs: A Back to Basics Approach


Stuart Reges - 2007
    By using objects early to solve interesting problems and defining objects later in the course, Building Java Programs develops programming knowledge for a broad audience. Introduction to Java Programming, Primitive Data and Definite Loops, Introduction to Parameters and Objects, Conditional Execution, Program Logic and Indefinite Loops, File Processing, Arrays, Defining Classes, Inheritance and Interfaces, ArrayLists, Java Collections Framework, Recursion, Searching and Sorting, Graphical User Interfaces. For all readers interested in introductory programming.

Concurrency in C# Cookbook


Stephen Cleary - 2014
    With this cookbook, you will find recipes for writing asynchronous, parallel, and reactive code in C# that enables your app or program to engage in more than one process at a time. Presented in O’Reilly’s popular problem-solution-discussion cookbook format, this guide provides ready-to-use code, along with an explanation of why and how the solution works.

August Rush


Frederic P. Miller - 2010
    Hart, and produced by Richard Barton Lewis. It has been called an up-to-date reworking of the Oliver Twist story by Charles Dickens.

Goodbye Poland


Stefan B. Maczka - 2014
    Good addition to other books on this subject. I enjoyed it very much.' UK Reviewer.Stefan Maczka’s father, (also Stefan), was a cavalry officer who fought victoriously in possibly the last and greatest cavalry battle of the preceding one hundred years, the ‘Miracle of the Vistula’. It was the final victory in the Russian/Polish War of 1920. He was one of nine thousand former soldiers rewarded with a plot of land in the reclaimed borderlands. Stalin never forgot that humiliating defeat.Stefan B. was born in 1922 just over two years later.Life was hard in those early years; the military settlers had to defend their borders against invasion by armed bands from Russia, crossing into Poland from the east.By 1937, the rewards of hard work were paying off, and life was beginning to get easier... Then came the war, and Stalin’s revenge on the military settlers he so bitterly despised for their victory over Soviet forces twenty years earlier. Rounded up, they were uprooted from their homes, put on cattle trucks, and forcibly deported to the frozen and inhospitable wastes of Siberia.Goodbye Poland is one man’s account of his journey into adversity at the age of just seventeen. Written exactly as he spoke, his accent comes through loud and clear, in this inspirational true story of stoicism, and survival against the odds.

Real and Complex Analysis


Walter Rudin - 1970
    The basic techniques and theorems of analysis are presented in such a way that the intimate connections between its various branches are strongly emphasized. The traditionally separate subjects of 'real analysis' and 'complex analysis' are thus united in one volume. Some of the basic ideas from functional analysis are also included. This is the only book to take this unique approach. The third edition includes a new chapter on differentiation. Proofs of theorems presented in the book are concise and complete and many challenging exercises appear at the end of each chapter. The book is arranged so that each chapter builds upon the other, giving students a gradual understanding of the subject.This text is part of the Walter Rudin Student Series in Advanced Mathematics.

I Quit! Now What?


Zarreen Khan - 2017
    Of endless weekdays, working weekends, making presentations, working with complicated Excel sheets, handling a boss with time-management issues and the general politics of the workplace. Sigh! After eight years of this life, her only personal insight is that she's terribly unambitious and constantly struggling to be an average performer in the competitive corporate world. When a colleague flashes the glint of a golden sabbatical she catapults into it headfirst. After all, one has to find one's calling at some point in one's life. So will the sabbatical miraculously change her life forever? Or will she go rushing back to her pocket money-generating job?

Vision: A Computational Investigation into the Human Representation and Processing of Visual Information


David Marr - 1982
    A computational investigation into the human representation and processing of visual information.

Dark Boundary


Anne Hobbs Purdy - 1954
    Anne Purdy, author of bestselling book Tisha, tells the story surrounding the lives of the Eagle Village Indians. She describes the end of the Gold Rush era changes that took place in the early part of the twentieth century, painting a vivid picture of life’s struggles here and of a woman who reaches out to those in desperate need of love and care.A tale of joy and sadness, with a final twist.

Data Structures Using C and C++


Yedidyah Langsam - 1995
     Covers the C++ language, featuring a wealth of tested and debugged working programs in C and C++. Explains and analyzes algorithms -- showing step- by-step solutions to real problems. Presents algorithms as intermediaries between English language descriptions and C programs. Covers classes in C++, including function members, inheritance and object orientation, an example of implementing abstract data types in C++, as well as polymorphism.

John D. Rockefeller: The Wealthiest Man In American History


Michael W. Simmons - 2017
    Rockefeller is held to be one of the wealthiest men who ever lived; he is also one of the most controversial figures in American history. Born of the unlikely union between a strict Baptist matriarch and her husband, a bigamist, alleged rapist, and snake-oil salesman, Rockefeller’s early childhood was spent learning how to shoulder an adult’s responsibility for his family and turn a deaf ear to the gossip that followed wherever his father went. This book contains highlights from the extraordinarily long life of a man many believed to be little better than a criminal, preying on small business owners to establish the supremacy of the Standard Oil Trust. John D. Rockefeller crushed his competitors and sparked massive public outrage against his businesses. Yet he also saved thousands of lives and helped establish respect for evidence-based medicine in the United States. From his teen years as a bookkeeper in a small commodities trading firm, to his imperial rule over the oil industry, to his early retirement and the decades he spent establishing philanthropic trusts in the fields of education and medicine, you will learn that there is no simple way to pass judgment on John D. Rockefeller’s life.