Book picks similar to
Programming Problems: A Primer for The Technical Interview by Bradley Green
tech-interviews
interviews
work-technical
software-engineering
Blind Love: The True Story Of The Texas Cadet Murder
Peter Meyer - 1998
She had been driven to an isolated spot outside of Mansfield, Texas by star student David Graham while David's girlfriend, Diane Zamora, hid in the trunk. First David tried unsuccessfully to break Adrianne's neck, then Diane came out of the trunk to attack her with a set of weights. To finish off the job, David shot her between the eyes. For months, there were no leads on the killing until Diane confessed to her military school roommates about the secret she and her boyfriend would take to their graves...Tainted LoveThe brutal killing shocked the entire town of Mansfield. Even more shocking were the killers, David and Diane, model teenagers, devoted high school sweethearts, military academy-bound honors students-- and desperate lovers who feared that Adrianne's sexual encounter with David had come between them. Killing Adrianne was "the only thing that could satisfy [Diane's] vengeance," said David in his confession to police-- the only way, she told David, to restore the 'purity' of their love...Pure VengeanceHere is the unbelievable true story of a macabre love triangle-- and the startling lengths one couple went to in the name of... Blind Love
SCJP Sun Certified Programmer for Java 6 Study Guide
Kathy Sierra - 2008
100% complete coverage of all official objectives for exam 310-065Exam Objective Highlights in every chapter point out certification objectives to ensure you're focused on passing the exam Exam Watch sections in every chapter highlight key exam topics coveredSimulated exam questions match the format, tone, topics, and difficulty of the real examCovers all SCJP exam topics, including:Declarations and Access Control - Object Orientation - Assignments - Operators - Flow Control, Exceptions, and Assertions - Strings, I/O, Formatting, and Parsing - Generics and Collections - Inner Classes - Threads - DevelopmentCD-ROM includes: Complete MasterExam practice testing engine, featuring: Two full practice exams; Detailed answers with explanations; Score Report performance assessment toolElectronic book for studying on the goBonus coverage of the SCJD exam includedBonus downloadable MasterExam practice test with free online registration.
Effective C++: 55 Specific Ways to Improve Your Programs and Designs
Scott Meyers - 1991
But the state-of-the-art has moved forward dramatically since Meyers last updated this book in 1997. (For instance, there s now STL. Design patterns. Even new functionality being added through TR1 and Boost.) So Meyers has done a top-to-bottom rewrite, identifying the 55 most valuable techniques you need now to be exceptionally effective with C++. Over half of this edition s content is new. Templates broadly impact C++ development, and you ll find them everywhere. There s extensive coverage of multithreaded systems. There s an entirely new chapter on resource management. You ll find substantial new coverage of exceptions. Much is gained, but nothing s lost: You ll find the same depth of practical insight that first made Effective C++ a classic all those years ago. Bill Camarda, from the July 2005 href="http://www.barnesandnoble.com/newslet... Only
Lou Reed: The Last Interview and Other Conversations
Lou Reed - 2015
In conversation with legendary rock critics and authors he respected, Reed’s interviews are as pithy and brilliant as the man himself.
Programming Rust: Fast, Safe Systems Development
Jim Blandy - 2015
Rust's modern, flexible types ensure your program is free of null pointer dereferences, double frees, dangling pointers, and similar bugs, all at compile time, without runtime overhead. In multi-threaded code, Rust catches data races at compile time, making concurrency much easier to use.Written by two experienced systems programmers, this book explains how Rust manages to bridge the gap between performance and safety, and how you can take advantage of it. Topics include:How Rust represents values in memory (with diagrams)Complete explanations of ownership, moves, borrows, and lifetimesCargo, rustdoc, unit tests, and how to publish your code on crates.io, Rust's public package repositoryHigh-level features like generic code, closures, collections, and iterators that make Rust productive and flexibleConcurrency in Rust: threads, mutexes, channels, and atomics, all much safer to use than in C or C++Unsafe code, and how to preserve the integrity of ordinary code that uses itExtended examples illustrating how pieces of the language fit together
Dive Into Python 3
Mark Pilgrim - 2009
As in the original book, Dive Into Python, each chapter starts with a real, complete code sample, proceeds to pick it apart and explain the pieces, and then puts it all back together in a summary at the end.This book includes:Example programs completely rewritten to illustrate powerful new concepts now available in Python 3: sets, iterators, generators, closures, comprehensions, and much more A detailed case study of porting a major library from Python 2 to Python 3 A comprehensive appendix of all the syntactic and semantic changes in Python 3 This is the perfect resource for you if you need to port applications to Python 3, or if you like to jump into languages fast and get going right away.
The Samson Effect
Tony Eldridge - 2007
Michael Sieff and Dr. Thomas Hamilton have stumbled onto a finding so astonishing that it could reshape the political and religious boundaries of the world. Hidden in a cave in Hebron, Israel they find an ancient scroll that gives evidence of a substance so powerful, it gave the Biblical strong man Samson his great strength.In the quest to uncover this powerful secret, they run into two other groups who also know of its existance. The first is a group of protectors chosen each generation to keep the ancient secret and use it when the moment is ready. The second is a ruthless Palestinian ruler who wants to use it to create an invincible army for Allah to purge the world of infidels and bring it under his control.Joined by an unlikely ally, Sieff and Hamilton travel the globe, dodge bullets, endure betrayal, and ultimately have to confront the most powerful enemy that this world has seen in ages. Facing unimagineable odds, they are the only two standing between freedom and conquest of the world. This is the page burner that New York Times best selling author Clive Cussler calls a "first rate thriller brimming with intrigue and adventure."
Object-Oriented Information Systems Analysis and Design Using UML
Simon Bennett - 1999
It can be used as a course book for students who are first encountering systems analysis and design at any level. This second edition contains many updates, including the latest version of the UML standard, and reflects the most up to date approaches to the information systems development process. It provides a clear and comprehensive treatment of UML 1.4 in the context of the systems development life cycle, without assuming previous knowledge of analysis and design. It also discusses implementation issues in detail and gives code fragments to show possible mappings to implementation technology. Extensive use of examples and exercises from two case studies provides the reader with many opportunities to practise the application of UML.
Systems Analysis & Design in a Changing World
John W. Satzinger - 2000
The Fourth Edition maintains the dual focus on the concepts and techniques from both the traditional, structured approach and the object-oriented approach to systems development. Instructors have the flexibility to emphasize one approach over the other, or both, while referring to one integrated case study that runs through every chapter.
The Dead Prince
Matthew Reilly - 2007
Name of the Rose meets Basic Instinct in this old-world thriller.
Black Bird
Greg Enslen - 2003
He's a drifter, leaving a trail of fear and death from coast to coast. Although he has always successfully avoided capture, he is haunted by the memory of the Sheriff of Liberty, Virginia. The man died nearly catching Jack--in fact, it was only by dumb luck that Jack had escaped. And that's always bothered him. Now, he's returning to the small town to settle the score. In Liberty, David Beaumont can't wait to leave his small hometown. He's grown so tired of listening to the endless stories about what a great man his father had been, how he had saved their town from a killer, sacrificing his own life to save them. David's got his money together, he's quit his job, and he's leaving town. He's leaving it all behind him.The only problem is the killings have started again...and David's the only one that can stop them. Should he return to the small town he despises? And if he does, will he end up the way his father did--dead?
CCNP ROUTE 642-902 Official Certification Guide (Official Cert Guide)
Wendell Odom - 2009
Book annotation not available for this title.Title: CCNP ROUTE 642-902Author: Odom, WendellPublisher: Pearson P T RPublication Date: 2010/02/09Number of Pages: 730Binding Type: HARDCOVERLibrary of Congress: 2009049908
Event Horizon
Scott McElhaney - 2011
Testing this theory however leaves him stranded 1100 years in the future with no hope of return. What he discovers is a frightening world devoid of all life. Now he must sift through the clues to learn what became of the world he once knew. Much to his surprise, he finds that these clues may lead him to another planet nearly 12 light years away. (from http://www.pixelofink.com/)
Network Warrior
Gary A. Donahue - 2007
What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.