Catalog Search Results
Author
Description
"Snappy Perl programs to streamline tasks and sharpen coding skills"--
"Perl one-liners are small and awesome Perl programs that fit in one line of code and do one thing really well. Perl One-Liners showcases 130 short and compelling lines of code that do all sorts of handy, geeky things like numbering lines in a file; generating random passwords; encoding, decoding, and converting strings; calculating factorials; even checking to see if a number...
Author
Description
"If you're like most people, you probably believe that humans are the most intelligent animals on our planet. But there's another kind of entity that can be far smarter: groups of people. In this groundbreaking book, Thomas Malone, the founding director of the MIT Center for Collective Intelligence, shows how groups of people working together in superminds--like hierarchies, markets, democracies, and communities--have been responsible for almost all...
Author
Description
"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause...
Author
Description
"This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their...
Author
Description
"Preface Welcome to an Introduction to the Art of Programming Using Scala". This book is intended to be used in rst and second semester college classrooms to teach students beginning programming. To accomplish this task, the Scala1 programming language is used. The book was constructed with a focus on the topics students need to know. These topics were then woven into a format that was deemed the best way to communicate those ideas. Because there...
Author
Description
"Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. Breaking this traditional model, "Computer Security Literacy: Staying Safe in a Digital World" instead...
Author
Description
"By integrating democratic government with cutting-edge American innovation, the lieutenant governor of California charts a bright future for open-source America. Citizenville is the story of how ordinary citizens can use new digital tools to dissolve political gridlock and transform American democracy"--
Author
Description
"The very first thing ever bought or sold on the Internet was marijuana, when Stanford and MIT students used ARPANET to cut a deal in the early '70s. Today, you can order any conceivable pill or powder with the click of a mouse. In Drugs Unlimited, Mike Power tells the tale of drugs in the Internet Age, in which users have outmaneuvered law enforcement, breached international borders, and created a massive worldwide black market. But the online market...
Author
Description
"The real challenge of programming isn't learning a language's syntax--it's learning to creatively solve problems so you can build something great. In this one-of-a-kind text, author V. Anton Spraul breaks down the ways that programmers solve problems and teaches you what other introductory books often ignore: how to Think Like a Programmer. Each chapter tackles a single programming concept, like classes, pointers, and recursion, and open-ended exercises...
Author
Description
"This book covers all you need to know to model and design software applications from use cases to software architectures in UML and shows how to apply the COMET UML-based modeling and design method to real-world problems. The author describes architectural patterns for various architectures, such as broker, discovery, and transaction patterns for service-oriented architectures, and addresses software quality attributes including maintainability,...
Author
Description
This is a practically-minded software engineering textbook aimed at final year undergraduate and graduate students, emphasizing formal methods in writing robust code quickly. This book takes an engineering approach to illuminate the creation and verification of large software systems in which theorems and axioms are intuited as the formalism materializes through practice.--[book cover].
Author
Description
"Developed from the author's many years of teaching computing courses, Programming in C++ for Engineering and Science guides readers in designing programs to solve real problems encountered in engineering and scientific applications, including radioactive decay, pollution indices, digital circuits, differential equations, Internet addresses, data analysis, simulation, quality control, electrical networks, data encryption, and beam deflection. To make...
Author
Description
"Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find...
Author
Description
"Preface To the student: We think that the theory dealing with what is hard about computation (and what is impossible!) is challenging but fun. This book grows out of these ideas, and our approach to teaching a course in computational complexity. There is no doubt that some of the material in these chapters is what might be called "wrap your brain around it" material, where a first reaction might be that the authors are pulling off a trick like a...
Description
"This book sounds an alarm: after decades of being lulled into complacency by narratives of technological utopianism and neutrality, people are waking up to the large-scale consequences of Silicon Valley-led technophilia. This book trains a spotlight on the inequality, marginalization, and biases in our technological systems, showing how they are not just minor bugs to be patched, but part and parcel of ideas that assume technology can fix--and control--society"--...
Description
The lessons in this tutorial cover the rules and strategies needed by college students to identify and correct common errors in pronoun usage in their academic writing. Students will find instruction and practice detailing definite and indefinite pronoun/antecedent agreement in number, pronoun/antecedent agreement in person, reference clarity in pronoun/antecedent agreement, pronoun case, and reflexive pronouns.
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request