May 26

RESERVE BOOKS


Wireless mesh networks

Recommending faculty: Dr. Nestor Tiglao (CoE 197, EE 298)

Authors Ian F. Akyildiz, Xudong Wang
Place of Publication Chichester, U.K.
Date of Publication 2009
Publisher John Wiley & Sons Ltd

Going beyond classic networking principles and architectures for better wireless performance

Written by authors with vast experience in academia and industry, Wireless Mesh Networks provides its readers with a thorough overview and in-depth understanding of the state-of-the-art in wireless mesh networking. It offers guidance on how to develop new ideas to advance this technology, and how to support emerging applications and services. The contents of the book follow the TCP/IP protocol stack, starting from the physical layer. Functionalities and existing protocols and algorithms for each protocol layer are covered in depth. The book is written in an accessible textbook style, and contains supporting materials such as problems and exercises to assist learning.

Key Features:

  • Presents an in-depth explanation of recent advances and open research issues in wireless mesh networking, and offers concrete and comprehensive material to guide deployment and product development
  • Describes system architectures and applications of wireless mesh networks (WMNs), and discusses the critical factors influencing protocol design
  • Explores theoretical network capacity and the state-of-the-art protocols related to WMNs
  • Surveys standards that have been specified and standard drafts that are being specified for WMNs, in particular the latest standardization results in IEEE 802.11s, 802.15.5, 802.16 mesh mode, and 802.16 relay mode
  • Includes an accompanying website with PPT-slides, further reading, tutorial material, exercises, and solutions

Advanced students on networking, computer science, and electrical engineering courses will find Wireless Mesh Networks an essential read. It will also be of interest to wireless networking academics, researchers, and engineers at universities and in industry.


CIRCULATION BOOKS


6LoWPAN : the wireless embedded internet

Recommending faculty: Dr. Nestor Tiglao

Authors Zach Shelby, Carsten Bormann
Place of Publication Chichester, U.K.
Date of Publication 2009
Publisher John Wiley & Sons Ltd

It is stunningly thorough and takes readers meticulously through the design, configuration and operation of IPv6-based, low-power, potentially mobile radio-based networking.” Vint Cerf, Vice President and Chief Internet Evangelist, Google

This book provides a complete overview of IPv6 over Low Power Wireless Area Network (6LoWPAN) technology

In this book, the authors provide an overview of the 6LoWPAN family of standards, architecture, and related wireless and Internet technology. Starting with an overview of the IPv6 ‘Internet of Things’, readers are offered an insight into how these technologies fit together into a complete architecture. The 6LoWPAN format and related standards are then covered in detail. In addition, the authors discuss the building and operation of 6LoWPAN networks, including bootstrapping, routing, security, Internet ingration, mobility and application protocols. Furthermore, implementation aspects of 6LoWPAN are covered.

Key Features:

  • Demonstrates how the 6LoWPAN standard makes the latest Internet protocols available to even the most minimal embedded devices over low-rate wireless networks
  • Provides an overview of the 6LoWPAN standard, architecture and related wireless and Internet technology, and explains the 6LoWPAN protocol format in detail
  • Details operational topics such as bootstrapping, routing, security, Internet integration, mobility and application protocols
  • Written by expert authors with vast experience in the field (industrial and academic)
  • Includes an accompanying website containing tutorial slides, course material and open-source code with examples (http://6lowpan.net )

6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems. Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful.


Hydrology in practice, Fourth edition

Recommending faculty: Prof. Cornelio Q. Dizon (CE 110)

Authors Elizabeth M. Shaw [and three others]
Place of Publication Boca Raton, FL
Date of Publication 2011
Publisher Spon Press

Hydrology in Practice is an excellent and very successful introductory text for engineering hydrology students who go on to be practitioners in consultancies, the Environment Agency, and elsewhere.

This fourth edition of Hydrology in Practice, while retaining all that is excellent about its predecessor, by Elizabeth M. Shaw, replaces the material on the Flood Studies Report with an equivalent section on the methods of the Flood Estimation Handbook and its revisions. Other completely revised sections on instrumentation and modelling reflect the many changes that have occurred over recent years. The updated text has taken advantage of the extensive practical experience of the staff of JBA Consulting who use the methods described on a day-to-day basis. Topical case studies further enhance the text and the way in which students at undergraduate and MSc level can relate to it. The fourth edition will also have a wider appeal outside the UK by including new material on hydrological processes, which also relate to courses in geography and environmental science departments. In this respect the book draws on the expertise of Keith J. Beven and Nick A. Chappell, who have extensive experience of field hydrological studies in a variety of different environments, and have taught undergraduate hydrology courses for many years.

Second- and final-year undergraduate (and MSc) students of hydrology in engineering, environmental science, and geography departments across the globe, as well as professionals in environmental protection agencies and consultancies, will find this book invaluable. It is likely to be the course text for every undergraduate/MSc hydrology course in the UK and in many cases overseas too.


Handbook of environmental fluid dynamics, (Set of 2 volumes)

Editor H. J. S. Fernando
Place of Publication Boca Raton, FL
Date of Publication [2013]
Publisher CRC Press/Taylor & Francis,

With major implications for applied physics, engineering, and the natural and social sciences, the rapidly growing area of environmental fluid dynamics focuses on the interactions of human activities, environment, and fluid motion. A landmark for the field, the two-volume Handbook of Environmental Fluid Dynamics presents the basic principles, fundamental flow processes, modeling techniques, and measurement methods used in the study of environmental motions. It also offers critical discussions of environmental sustainability related to engineering.

The handbook features 81 chapters written by 135 renowned researchers from around the world. Covering environmental, policy, biological, and chemical aspects, it tackles important cross-disciplinary topics such as sustainability, ecology, pollution, micrometeorology, and limnology.

Volume One: Overview and Fundamentals provides a comprehensive overview of the basic principles. It starts with general topics that emphasize the relevance of environmental fluid dynamics research in society, public policy, infrastructure, quality of life, security, and the law. It then discusses established and emerging focus areas. The volume also examines the sub-mesoscale flow processes and phenomena that form the building blocks of environmental motions, with emphasis on turbulent motions and their role in heat, momentum, and species transport.

Volume Two: Systems, Pollution, Modeling, and Measurements explores the interactions between engineered structures and anthropogenic activities that affect natural flows, with particular emphasis on environmental pollution. The book covers the numerical methodologies that underpin research, predictive modeling, and cyber-infrastructure developments. It also addresses practical aspects of laboratory experiments and field observations that validate quantitative predictions and help identify new phenomena and processes.

As communities face existential challenges posed by climate change, rapid urbanization, and scarcity of water and energy, the study of environmental fluid dynamics becomes increasingly relevant. This volume is a valuable resource for students, researchers, and policymakers working to better understand the fundamentals of environmental motions and how they affect and are influenced by anthropogenic activities.


Hydrology and the management of watersheds, Fourth edition

Authors Kenneth N. Brooks, Peter F. Ffolliott, Joseph A. Magner
Place of Publication Ames, Iowa
Date of Publication 2013
Publisher Wiley-Blackwell

This new edition is a major revision of the popular introductory reference on hydrology and watershed management principles, methods, and applications. The book’s content and scope have been improved and condensed, with updated chapters on the management of forest, woodland, rangeland, agricultural urban, and mixed land use watersheds. Case studies and examples throughout the book show practical ways to use web sites and the Internet to acquire data, update methods and models, and apply the latest technologies to issues of land and water use and climate variability and change.


Plumbing, 4th edition

Author R. D. Treloar
Place of Publication Chichester, West Sussex, UK
Date of Publication 2012
Publisher Wiley-Blackwell

The 4th edition of Plumbing continues to provide the definitive single volume text on plumbing, heating and gas installation work, ideal for students working towards their Diploma in plumbing or NVQ/SVQ at levels 2 and 3. Highly illustrated and easy to read and understand, it tackles plumbing topic by topic, in double page spreads with text, full colour illustrations, and clear photographs, enabling the reader to grasp the essentials quickly and easily. This approach ensures it also provides a concise reference for the trained plumber.

Special features include:

  • concise text
  • many clear, full colour illustrations
  • around 140 photographs
  • topics focussed on the needs of NVQ/SVQ levels 2 and 3
  • additional topics beyond levels 2 and 3
  • a self-assessment section
  • a problem-solving section

This new edition has been thoroughly updated to take account of changes to the Building Regulations, including changes to the following approved documents: Part F: Ventilation; Part G: Sanitation, hot water safety and water efficiency; Part H: Drainage and waste disposal; Part L: Conservation of fuel and power and Part P: Electrical safety. A significant new section on energy conservation & sustainability has been added, and additional related material introduced where relevant. The extensive coverage with new, full color illustrations to enhance legibility and understanding, and the emphasis on safety in the work place ensure this remains the definitive single volume for both student and trained plumbers.


Building maintenance management, Second edition

Authors Barrie Chanter and Peter Swallow
Place of Publication New Delhi
Date of Publication [2007]
Publisher Blackwell Publishing/Wiley India Pvt. Ltd.

This new edition of an informative and accessible book guides building surveyors and facilities managers through the key aspects of property maintenance and continues to be of value to both students and practitioners.

With the increasing cost of new-build, effective maintenance of existing building stock is becoming ever more important and building maintenance work now represents nearly half of total construction output in the UK.

Building Maintenance Management provides a comprehensive profile of the many aspects of property maintenance.  This second edition has been updated throughout, with sections on outsourcing; maintenance planning; bench marking and KPIs; and current trends in procurement routes (including partnering and the growth of PFI) integrated into the text.  There is also a new chapter on the changing context within which maintenance is carried out, largely concerned  with its relationship to facilities management.  More coverage is given of maintenance organizations and there are major updates to relevant aspects of health and and safety and to contract forms.


Project management of complex and embedded systems : ensuring product integrity and program quality

Recommending faculty: Prof. Joy Madamba

Authors Kim H. Pries, Jon M. Quigley
Place of Publication Boca Raton, FL
Date of Publication [2009]
Publisher CRC Press

There are many books on project management and many on embedded systems, but few address the project management of embedded products from concept to production. Project Management of Complex and Embedded Systems: Ensuring Product Integrity and Program Quality uses proven Project Management methods and elements of IEEE embedded software development techniques, to explain how to deliver a reliable complex system to market.

This volume begins with a general discussion of project management, followed by an examination of the various tools used before a project is underway. The book then delves into the specific project stages: concept, product development, process development, validation of the product and process, and release to production. Finally, post-project stages are explored, including failure reporting, analysis, corrective actions, and product support.

The book draws heavily on information from Department of Defense sources as well as systems developed by the Automotive Industry Action Group, General Motors, Chrysler, and Ford to standardize the approach to designing and developing new products. These automotive development and production ideas have universal value, particularly the concept of process and design controls. The authors use these systems to explain project management techniques that can assist developers of any embedded system. The methods explored can be adapted toward mechanical development projects as well.

The text includes numerous war stories offering concrete solutions to problems that might occur in production. Tables and illustrative figures are provided to further clarify the material. Organized sequentially to follow the normal life cycle of a project, this book helps project managers identify challenges before they become problems and resolve those issues that cannot be avoided.


Power system modelling and scripting

Recommending faculty: Prof. Joy Madamba

Author Federico Milano
Place of Publication London
Date of Publication [2010]
Publisher Springer

Interconnected power systems are the largest and most complex systems ever built by man.  This book provides a systematic approach for mastering power system analysis and modelling through modern and open computer programming techniques.  The object is to provide the reader with the skill of formulating well-posed models and of “translating” such models into a collection of simple modular scripts.  The book addresses standard topics, e.g., power flow analysis and time domain integration; conventional devices, e.g., synchronous machines and regulating transformers; and advanced devices, e.g., flexible ac transmission systems and distributed energy resources.


Automobile mechanical and electrical systems : automotive technology : vehicle maintenance and repair

Recommending faculty: Dr. Manuel C. Ramos Jr.

Author Tom Denton
Place of Publication Oxford
Date of Publication 2011
Publisher Butterworth-Heinemann/Elsevier

Automobile Mechanical and Electrical Systems concentrates on core technologies to provide the essential information required to understand how different vehicle systems work. It gives a complete overview of the components and workings of a vehicle from the engine through to the chassis and electronics. It also explains the necessary tools and equipment needed in effective car maintenance and repair, and relevant safety procedures are included throughout. In full colour and including examples of the latest Formula 1 technology, this is the guide no student enrolled on an automotive maintenance and repair course should be without.

Designed to make learning easier, this book contains:

  • Photographs, flow charts and quick reference tables
  • Detailed diagrams and clear descriptions that simplify the more complicated topics and aid revision
  • Useful margin features throughout, including definitions, key facts and ‘safety first’ considerations

Parking structures, (Set of 2 volumes)

Author Ilja Irmscher
Place of Publication Berlin
Date of Publication [2013]
Publisher DOM Publishers

50 international multi-storey car parks with detailed planning material show new trends in the areas of multi-storey car park design and innovative parking systems. The book includes an introduction to architectural heritage with many sample buildings, illustrated with large-format photographs. The appendix contains standards and measurements in chart form, presented in an easy to understand way – a practical tool for designers.


Mathematics for physical chemistry, 4th ed.

Recommending faculty: Prof. Michael Bayona

Author Robert G. Mortimer
Place of Publication Amsterdam
Date of Publication 2013
Publisher Academic Press

Mathematics for Physical Chemistry is the ideal supplementary text for practicing chemists and students who want to sharpen their mathematics skills while enrolled in general through physical chemistry courses. This book specifically emphasizes the use of mathematics in the context of physical chemistry, as opposed to being simply a mathematics text.

This 4e includes new exercises in each chapter that provide practice in a technique immediately after discussion or example and encourage self-study. The early chapters are constructed around a sequence of mathematical topics, with a gradual progression into more advanced material. A final chapter discusses mathematical topics needed in the analysis of experimental data.

  •  Numerous examples and problems interspersed throughout the presentations
  • Each extensive chapter contains a preview and objectives
  •  Includes topics not found in similar books, such as a review of general algebra and an introduction to group theory
  • Provides chemistry-specific instruction without the distraction of abstract concepts or theoretical issues in pure mathematics

JavaScript programming : pushing the limits : advanced application development with JavaScript & HTML5

Recommending faculty: Prof. Roy Vincent Canseco

Author Jon Raasch
Place of Publication Chichester, West Sussex, United Kingdom
Date of Publication 2013
Publisher John Wiley & Sons Ltd

Take your JavaScript knowledge as far as it can go

JavaScript has grown up, and it’s a hot topic. Newer and faster JavaScript VMs and frameworks built upon them have increased the popularity of JavaScript for server-side web applications, and rich JS applications are being developed for mobile devices. This book delivers a compelling tutorial, showing you how to build a real-world app from the ground up. Experienced developers who want to master the latest techniques and redefine their skills will find this deep dive into JavaScript’s hidden functionalities gives them the tools to create truly amazing and complex applications.

  • JavaScript has evolved into much more than simple client-side scripting; this book delves into advanced topics not generally found in other more intermediate JS development books
  • Expert author delivers an in-depth tutorial showing how to build a real-world app that is loosely coupled, with each component built to exist separately
  • Explores how to build a backbone app, the importance of JavaScript templates, Node.js and MongoDB, 3D Canvas using WebGL / Three.js, how to convert a desktop app into a dedicated mobile app, and much more
  • Ideal for experienced developers with a deep knowledge of JavaScript as well as online developers with strong graphic design skills who are experienced in HTML/CSS and want to develop their front-end skills

JavaScript Programming: Pushing the Limits will arm you with the skills to create killer apps for the 21st Century.


Exploring CQRS and event sourcing : a journey into high scalability, availability, and maintainability with Windows Azure

Donated by: Mr. Johnson Apacible

Author Dominic Betts [and four others]
Place of Publication [Redmond, Washington]
Date of Publication [2012]
Publisher Microsoft

This guide is focused on building highly scalable, highly available, and maintainable applications with the Command & Query Responsibility Segregation and the Event Sourcing architectural patterns. It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques.

The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical.

The CQRS pattern and event sourcing are not mere simplistic solutions to the problems associated with large-scale, distributed systems. By providing you with both a working application and written guidance, we expect you’ll be well prepared to embark on your own CQRS journey.


May 25

CIRCULATION BOOKS


The code book : the science of secrecy from ancient Egypt to quantum cryptography, First Anchor Books edition

Donated by: Mr. Johnson Apacible

Author Simon Singh
Place of Publication New York
Date of Publication 2000
Publisher Anchor Books

In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make yo wonder how private that e-mail you just sent really is.


Code : the hidden language of computer hardware and software

Donated by: Mr. Johnson Apacible

Author Charles Petzold
Place of Publication Redmond, Washington
Date of Publication [2000]
Publisher Microsoft Press

What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries.

Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines.
It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.


Linear algebra and its applications, Third edition update

Donated by: Mr. Johnson Apacible

Author David C. Lay
Place of Publication Boston
Date of Publication [2006]
Publisher Pearson/Addison-Wesley

 

The response of students and teachers to the first three editions of Linear Algebra and Its Applications has been most gratifying.  This Third Edition Update provides substantial new support both for teaching and for using technology in the course.  As before, the text provides a modern elementary introduction to linear algebra and a broad selection of interesting applications.  The material is accessible to students with the maturity that should come from successful completion of two semesters of college-level mathematics, usually calculus.

The main goal of the text is to help students master the basic concepts and skills they will use later in their careers.  The topics here follow the recommendations of the Linear algebra Curriculum Study Group, which were based on a careful investigation of the real needs of the students and a consensus among professionals in many disciplines that use linear algebra.  Hopefully, this course will be one of the most useful and interesting mathematics classes taken as an undergraduate.


Developing international software, Second edition

Donated by: Mr. Johnson Apacible

Author Dr. International
Place of Publication Redmond, Washington
Date of Publication [2003]
Publisher Microsoft Press

In today’s global economy, there are clear advantages to developing applications that can meet the needs of users across a wide variety of languages, countries, and cultures. Discover how to develop for the whole world with the second edition of this classic guide—now completely revised and updated to cover the latest techniques and insights, and designed for anyone who wants to write world-ready code for the Microsoft® Windows® 2000 and Windows XP platforms. It explains how to localize applications easily and inexpensively, determine important culture-specific issues, avoid international pitfalls and legal issues, use the best available technologies and coding practices, and more. It covers all of the essentials for developing international software—while revealing the hard-earned collective wisdom of the Microsoft international teams. Topics covered include:

  • Introduction: Understanding internationalization and designing a world-ready program
  • Globalization: Unicode; locale and cultural awareness; text input, output, and display; multilingual user interface (MUI)
  • Localizability: Software localizability guidelines, mirroring, and content localizability guidelines
  • Localization and testing: Localization, testing for world-readiness, sample international test cases, and testing localizability with pseudolocalization
  • Tools and technologies: Graphics Device Interface Plus (GDI+), Hypertext Markup Language (HTML), Microsoft Internet Information Services (IIS), Microsoft Office, MLang, Microsoft Layer for Unicode (MSLU), The Microsoft .NET Framework, OpenType® Fonts, RichEdit, Microsoft SQL Server™, Text Services Framework (TSF), Uniscribe, Microsoft Visual Studio® .NET, Extensible Markup Language (XML)

INCLUDED ON CD-ROM: A fully searchable electronic copy of the book Code pages, documentation, and a case study Sample code, including Windows Platform SDK samples and .NET samples International tools and utilities

A Note Regarding the CD or DVD

The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O’Reilly Media’s Digital Distribution services. To download this content, please visit O’Reilly’s web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.


Schaum’s outline of linear algebra, Fourth edition

Donated by: Mr. Johnson Apacible

Authors Seymour Lipschutz, Marc Lars Lipson
Place of Publication New York
Date of Publication [2009]
Publisher McGraw-Hill

Linear algebra is a foundation course for students entering mathematics, engineering, and computer science, and the fourth edition includes more problems connected directly with applications to these majors. It is also updated throughout to include new essential appendices in algebraic systems, polynomials, and matrix applications.

This Schaum’s Outline gives you

  • 612 problems with full solutions that reinforce knowledge
  • Concise explanations of all concepts in linear algebra
  • Updates that cover the latest course developments with coverage of algebraic systems, polynomials, and matrix applications

Programming Microsoft LINQ

Donated by: Mr. Johnson Apacible

Authors Paolo Pialorsi and Marco Russo
Place of Publication Redmond, Washington
Date of Publication [2008]
Publisher Microsoft Press

Get comprehensive guidance for using the Microsoft Language Integrated Query (LINQ) Project with in-depth insights from two experienced developers. Data-rich applications can be difficult to create because of the tremendous differences between query languages used to access data and programming languages commonly used to write applications. This practical guide covers the intricacies of LINQ, a set of extensions to the Visual C# and Visual Basic programming languages. Instead of traversing different language syntaxes required for accessing data from relational and hierarchical data sources, developers will learn how to write queries natively in Visual C# or Visual Basic helping reduce complexity and boost productivity. Written by two experienced developers with strong ties to developer teams at Microsoft, this book describes the LINQ architecture and classes, details the new language features in both C# and Visual Basic, and provides code samples in both languages.

Key Book Benefits:

  • Delivers an in-depth guidance for using LINQ
  • Covers architecture, syntax, and classes, illustrating how developers can integrate LINQ into their toolkits
  • Features code samples in Visual C# (plus Visual Basic in some chapters)

Foundations of Ajax

Donated by: Mr. Johnson Apacible

Authors Ryan Asleson, Nathaniel T. Schutta
Place of Publication Berkeley, CA
Date of Publication [2006]
Publisher Apress

* Ajax is one of the hottest topics in the developer community right now! and this will be the first Ajax book that offers detailed explanation of how Ajax works and how to use it to best effect. Theory and practice covered immediately in one volume.

* Ajax works across many platforms and different groups of developers – this book is designed to be suitable for all those developers across all those platforms, who are interested in the hot new topic of Ajax.

* Demand for Ajax knowledge will be strong. Leading technology companies like Google, Yahoo, Adaptive Path, and Amazon are adopting Ajax techniques, and many other companies are doing the same in order to compete with Ajax. This book connect the developer community to the new Ajax functionality.


The Unicode standard version 2.0

Donated by: Mr. Johnson Apacible

Place of Publication Reading, Mass.
Date of Publication 1996
Publisher Addison-Wesley Developers Press

Version 3.0 now available! Modern software must function all around the world. This demands a single character set that works everywhere. The Unicode Standard is the proven answer, implemented in software for the world market: Windows NT and Windows 95, AIX, NetWare 4.0, QuickDraw GX, and Java. The list grows! Version 2.0 of the Unicode Standard introduces additional scripts, and contains over five years’ worth of cumulated experience from unrivaled experts in multilingual applications. Unicode scripts include alphabets used in the Western world, Africa, the Middle East, the Indian subcontinent and other parts of Asia, as well as the unified Han set of East Asian ideographs and the complete set of modern Korean Hangul. The standard is also consistent with International Standard ISO/IEC 10646. The Unicode Standard, Version 2.0 is the official source of information on the new version of the standard. Providing more than just code charts and character names, this authoritative guide covers every aspect of implementation, including structure, character properties, rules for conformance, and implementation guidelines.There are also standard algorithms for formatting Arabic, Devanagari, and Tamil scripts, for display of bidirectional text (e. g., mixed English and Arabic), and for the creation of Korean Hangul syllables. The accompanying CD-ROM provides a complete character properties database and tables that map Unicode characters to international, national, and vendor character sets. The Unicode Standard, Version 2.0 is an essential reference for computer programmers and software developers working on global software and multilingual applications


Quantum computation and quantum information

Donated by: Mr. Johnson Apacible

Authors Michael A. Nielsen and Isaac L. Chuang
Place of Publication Cambridge, UK
Date of Publication 2000
Publisher Cambridge University Press

In this first comprehensive introduction to the main ideas and techniques of quantum computation and information, Michael Nielsen and Isaac Chuang ask the question: What are the ultimate physical limits to computation and communication? They detail such remarkable effects as fast quantum algorithms, quantum teleportation, quantum cryptography and quantum error correction. A wealth of accompanying figures and exercises illustrate and develop the material in more depth. They describe what a quantum computer is, how it can be used to solve problems faster than familiar “classical” computers, and the real-world implementation of quantum computers. Their book concludes with an explanation of how quantum states can be used to perform remarkable feats of communication, and of how it is possible to protect quantum states against the effects of noise.


Learn cocos2D game development with iOS 5

Donated by: Mr. Johnson Apacible

Authors Steffen Itterheim, Andreas Low
Place of Publication New York, NY
Date of Publication [2011]
Publisher Apress

Create compelling 2D games with Learn cocos2d Game Development with iOS 5. This book shows you how to use the powerful cocos2d game engine to develop games for iPhone and iPad with tilemaps, virtual joypads, Game Center, and more.

It teaches you:

  • The process and best practices of mobile game development, including sprite batching, texture atlases, parallax scrolling, touch and accelerometer input.
  • How to enhance your games using the Box2D and Chipmunk physics engines and other cocos2d-related tools and libraries.
  • How to add UIKit views to cocos2d and how to add cocos2d to UIKit apps.
  • The ins and outs of the Kobold2D development environment for cocos2d and its preconfigured libraries, including cocos3d and Lua.

Best of all, Learn cocos2d Game Development with iOS 5 will have you making games right from the very start. It guides you step-by-step through the creation of sample games. These fun examples are modeled after popular App Store games and teach you key concepts of the cocos2d game engine and relevant tools like TexturePacker (texture atlas), PhysicsEditor (physics collision shapes), Particle Designer (particle effects), Glyph Designer (bitmap fonts), and others.

This book offers a rock-solid introduction to creating games made entirely with cocos2d and little or no iOS 5 SDK and OpenGL code. It also details alternative implementations, identifies the best free and commercial tools for cocos2d game development, features coverage of the author’s improved cocos2d game engine (Kobold2D), and even helps you enhance your game’s marketability on the App Store.


Semantic Web programming

Donated by: Mr. Johnson Apacible

Editors John Hebeler [and three others]
Place of Publication Indianapolis, IN
Date of Publication [2009]
Publisher Wiley Publishing, Inc.

The next major advance in the Web?Web 3.0?will be built on semantic Web technologies, which will allow data to be shared and reused across application, enterprise, and community boundaries. Written by a team of highly experienced Web developers, this book explains examines how this powerful new technology can unify and fully leverage the ever-growing data, information, and services that are available on the Internet. Helpful examples demonstrate how to use the semantic Web to solve practical, real-world problems while you take a look at the set of design principles, collaborative working groups, and technologies that form the semantic Web. The companion Web site features full code, as well as a reference section, a FAQ section, a discussion forum, and a semantic blog.


Exploiting online games : cheating massively distributed systems

Donated by: Mr. Johnson Apacible

Authors Greg Hoglund, Gary McGraw
Place of Publication Boston, MA
Date of Publication [2008]
Publisher Addison-Wesley

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft™ and Second Life®. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.

This book covers

  • Why online games are a harbinger of software security issues to come
  • How millions of gamers have created billion-dollar virtual economies
  • How game companies invade personal privacy
  • Why some gamers cheat
  • Techniques for breaking online game security
  • How to build a bot to play a game for you
  • Methods for total conversion and advanced mods

Written by the world’s foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today’s online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow’s security techniques on display today.


Multiple view geometry in computer vision

Donated by: Mr. Johnson Apacible

Authors Richard Hartley, Andrew Zisserman
Place of Publication Cambridge, UK
Date of Publication 2000
Publisher Cambridge University Press

A basic problem in computer vision is to understand the structure of a real world scene given several images of it. Techniques used in the book for solving this are taken from projective geometry and photogrammetry. The authors cover the geometric principles and their algebraic representation in terms of camera projection matrices, the fundamental matrix and the trifocal tensor. The theory and methods of computation of these entities are discussed with real examples, as is their use in the reconstruction of scenes from multiple images. Recent major developments in the theory and practice of scene reconstruction are described in detail in a unified framework. The authors provide comprehensive background material, so a reader familiar with linear algebra and basic numerical methods will be able to understand the projective geometry and estimation algorithms presented, and implement the algorithms directly from the book.


Beyond the desktop metaphor : designing integrated digital work environments

Donated by: Mr. Johnson Apacible

Editors Victor Kaptelinin and Mary Czerwinski
Place of Publication Cambridge, MA
Date of Publication c2007
Publisher MIT Press

The computer’s metaphorical desktop, with its onscreen windows and hierarchy of folders, is the only digital work environment most users and designers have ever known. Yet empirical studies show that the traditional desktop design does not provide sufficient support for today’s real-life tasks involving collaboration, multitasking, multiple roles, and diverse technologies. In Beyond the Desktop Metaphor, leading researchers and developers consider design approaches for a post-desktop future.The contributors analyze the limitations of the desktop environment–including the built-in conflict between access and display, the difficulties in managing several tasks simultaneously, and the need to coordinate the multiple technologies and information objects (laptops, PDAs, files, URLs, email) that most people use daily–and propose novel design solutions that work toward a more integrated digital work environment. They describe systems that facilitate access to information, including Lifestreams, Haystack, Task Factory, GroupBar, and Scalable Fabric, and they argue that the organization of work environments should reflect the social context of work. They consider the notion of activity as a conceptual tool for designing integrated systems, and point to the Kimura and Activity-Based Computing systems as examples.Beyond the Desktop Metaphor is the first systematic overview of state-of-the-art research on integrated digital work environments. It provides a glimpse of what the next generation of information technologies for everyday use may look like–and it should inspire design solutions for users’ real-world needs.


GPU gems 3

Donated by: Mr. Johnson Apacible

Editor Hubert Nguyen
Place of Publication Upper Saddle River, NJ
Date of Publication [2008]
Publisher Addison-Wesley

“The GPU Gems series features a collection of the most essential algorithms required by Next-Generation 3D Engines.”
—Martin Mittring, Lead Graphics Programmer, Crytek

This third volume of the best-selling GPU Gems series provides a snapshot of today’s latest Graphics Processing Unit (GPU) programming techniques. The programmability of modern GPUs allows developers to not only distinguish themselves from one another but also to use this awesome processing power for non-graphics applications, such as physics simulation, financial analysis, and even virus detection—particularly with the CUDA architecture. Graphics remains the leading application for GPUs, and readers will find that the latest algorithms create ultra-realistic characters, better lighting, and post-rendering compositing effects.

The accompanying DVD includes complementary examples and sample programs.


Professional pen testing for Web applications

Donated by: Mr. Johnson Apacible

Author Andres Andreu
Place of Publication Indianapolis, IN
Date of Publication [2006]
Publisher Wiley Publishing Inc.

There is no such thing as “perfect security” when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you’ll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.

After a review of the basics of web applications, you’ll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.

What you will learn from this book

  • Surveillance techniques that an attacker uses when targeting a system for a strike
  • Various types of issues that exist within the modern day web application space
  •  How to audit web services in order to assess areas of risk and exposure
  • How to analyze your results and translate them into documentation that is useful for remediation
  • Techniques for pen-testing trials to practice before a live project

Who this book is for

This book is for programmers, developers, and information security professionals who want to become familiar with web application security and how to audit it.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.


Advanced topics in computer vision

Donated by: Mr. Johnson Apacible

Editors Giovanni Maria Farinella, Sebastiano Battiato, Roberto Cipolla
Place of Publication London
Date of Publication [2013]
Publisher Springer

This book presents a broad selection of cutting-edge research, covering both theoretical and practical aspects of reconstruction, registration, and recognition. The text provides an overview of challenging areas and descriptions of novel algorithms. Features: investigates visual features, trajectory features, and stereo matching; reviews the main challenges of semi-supervised object recognition, and a novel method for human action categorization; presents a framework for the visual localization of MAVs, and for the use of moment constraints in convex shape optimization; examines solutions to the co-recognition problem, and distance-based classifiers for large-scale image classification; describes how the four-color theorem can be used for solving MRF problems; introduces a Bayesian generative model for understanding indoor environments, and a boosting approach for generalizing the k-NN rule; discusses the issue of scene-specific object detection, and an approach for making temporal super resolution video.


Fusion in computer vision : understanding complex visual content

Donated by: Mr. Johnson Apacible

Editors Bogdan Ionescu [and three others]
Place of Publication Cham
Date of Publication [2014]
Publisher Springer

This book presents a thorough overview of fusion in computer vision, from an interdisciplinary and multi-application viewpoint, describing successful approaches, evaluated in the context of international benchmarks that model realistic use cases. Features: examines late fusion approaches for concept recognition in images and videos; describes the interpretation of visual content by incorporating models of the human visual system with content understanding methods; investigates the fusion of multi-modal features of different semantic levels, as well as results of semantic concept detections, for example-based event recognition in video; proposes rotation-based ensemble classifiers for high-dimensional data, which encourage both individual accuracy and diversity within the ensemble; reviews application-focused strategies of fusion in video surveillance, biomedical information retrieval, and content detection in movies; discusses the modeling of mechanisms of human interpretation of complex visual content.


Home technology integration fundamentals and certification (with Lab Manual)

Donated by: Mr. Johnson Apacible

Authors Cisco Learning Institute and Academic Business Consultants
Place of Publication Upper Saddle River, N.J.
Date of Publication [2004]
Publisher Pearson Prentice Hall

Success in the home technology integration (HTI) field requires technical knowledge and hands-on skills in a variety of related technologies.  HTI technicians must be conversant in and comfortable with high-and-low-voltage electricity installations, security, HVAC, lighting, video, audio, and home networking.

Cisco Learning Institute’s Home Technology Integration Training Program covers all of these diverse areas.  It explains to the reader how to integrate all of these technologies into one, easy-to-maintain, scalable solution for the customer.  This text and  and lab manual package discusses how to estimated, install, and document and integrated, whole-house networking solution.  The hands-on labs provide industry-based experience needed to study and prepare for the CompTIA HTI+Certification exams.

Key features include:

  • The main text, in two-color and with numerous illustrations, contains student objectives, chapter glossaries, and end-of-chapter review questions to aid in understanding and retention.
  • The lab manual includes discussions and instructions on how to complete the hands-on exercises.
  • The certification kit on the accompanying CD includes hands-on, web-based activities as well as hundreds of questions to help you prepare for the exam.
  • An examGear CD containing hundreds of questions to help you prepare for the HTI+ Certification exam.
  • Authentication to access the web-based curriculum, which contains over 50 hands-on labs using state-of-the-art equipment, through an authorized training site.

STL tutorial and reference guide : C++ programming with the standard template library

Donated by: Mr. Johnson Apacible

Authors David R. Musser, Atul Saini foreword by Alexander Stepanov
Place of Publication Reading, Massachusetts
Date of Publication [1996]
Publisher Addison-Wesley Publishing Company

The Standard Template Library (STL) represents a breakthrough in C++ programming methodology. Comprising a set of C++ generic data structures and algorithms, STL provides reusable, interchangeable components adaptable to many different uses without sacrificing efficiency. Adopted by the ANSI/ISO C++ Standards Committee, STL is an important addition to every C++ programmer’s portfolio of skills. This book introduces you to STL and provides the information and techniques you need to become a proficient STL programmer. The book includes a tutorial, a thorough description of each element of the library, numerous sample applications, and a comprehensive reference. You will find in-depth explanations of iterators, generic algorithms, containers, and function objects. Several larger, non-trivial applications, including a dictionary lookup program, demonstrate how to put STL’s power and flexibility to work. The book will also show you how to integrate STL with object-oriented programming techniques, while the comprehensive and detailed STL reference guide will be a constant and convenient companion as you learn to work with the library.


The Order of things : hierarchies, structures, and pecking orders

Donated by: Mr. Johnson Apacible

Author Barbara Ann Kipfer
Place of Publication New York, NY
Date of Publication c2008
Publisher Workman Pub.

Utterly compelling!
Barbara Ann Kipfer has elevated the list to high art and bestselling pleasure. A foremost expert of classification, in The Order of Things, she does for life what her previous books do for happiness and wisdom―organize it in a way that is brilliantly conceived.

The The Order of Things is practical, entertaining, eclectic, and impossible to put down. Beginning with Earth―Smog Alert States, Rain Forest Layers, Coal Sizes― and ending with General Knowledge and Philosophy (the I Ching’s 64 “chapters,” Ludwig Wittgenstein’s four-step Method of Overcoming Puzzlement), it is a 14-chapter taxonomy of the world as we know it:

  •  The Seven Hills of Rome, the Seven Deadly Sins, the Seven Wonders of the Ancient World, the Seven Dwarfs―check.
  •  The belt degrees of karate and judo, weight classes of professional and amateur boxing, flower names of the golf holes at Augusta―check.
  •   The hierarchy of the FBI, publication order of Shakespeare’s plays, cuts of beef, Freud’s divisions of the human psyche, order of rank in world armies and navies, Jupiter’s satellites, ships’ bells, traditional and modern wine measures, blood-pressure levels, fastest animals―check.

A completely indispensable reference―check.


May 25

 

  ACM Inroad                         Vol. 6 no. 3                               Vol. 6 no. 4   ACM Journal on Computing and Cultural Heritage            Vol.7 no.1-4                            Vol.8 no.1-4
   ACM Transactions on  Accessible Computing           Vol. 6 no.2                                Vol. 7 no.2     ACM Transactions on  Architecture and Code  Optimization                           Vol. 12 no. 2                            Vol. 12 no. 3                            Vol. 12 no. 4
    ACM Transactions on  Applied Perception                Vol. 12 no.1   ACM Transactions on Applied Perception                             Vol. 12 no.3
 ACM Transactions on  Database Systems                  Vol. 40 no. 2                              Vol. 40 no. 3
ACM Transactions on Embedded Computing Systems
Vol.14 no.2
Vol.14 no.3
Vol.14 no.4
ACM Transactions on Graphics                         Vol.34 no.2
    ACM Transactions on  Graphics                               Vol.34 no.5
  ACM Transactions on Information Systems            Vol. 32 no. 2                          Vol. 32 no. 3                         Vol. 32 no. 4                  ACM Transactions on  Intelligent Systems and  Technology                             Vol.6 no.1                                Vol.6 no.2                                Vol.6 no.3                                  Vol.6 no.4                                  Vol.7 no.1
   ACM Transactions on  Knowledge Discovery from  Data                                        Vol.9 no.1                              Vol.9 no.3                             Vol.9 no.4    ACM Transactions on Multimedia Computing, Communications and Applications                         Vol.11 no.3                           Vol.11 no.4
   ACM Transactions on  Mathematical Software       Vol. 41 no. 2                            Vol. 41 no. 2     ACM Transactions on Programming Languages and Systems                                 Vol. 37 no.2                             Vol. 37 no.3                             Vol. 37 no.4                             Vol. 38 no.1
    ACM Transactions on  Software Engineering and  Methodology                          Vol. 24,no. 3   Bulletin of the International Institute of Seismology and Earthquake Engineering        Vol. 50
  Communications of the ACM   Vol. 58 no.6  
  Communications of the ACM Vol. 58 no.8
  IEEE/ACM Transactions on Networking                             Vol. 23 no. 2                             Vol. 23 no. 3                           Vol. 23 no. 4                         Vol. 23 no. 6 
   Interactions                            Vol. 22 no. 4

 

 

 

   Interactions                            Vol. 22 no. 6     SIGMIS                                   Vol. 46 no. 2

 

 

May 5

CIRCULATION BOOKS


C# in depth, Second edition

Donated by: Mr. Johnson Apacible

Author Jon Skeet
Place of Publication Stamford, CT
Date of Publication [2011]
Publisher Manning Publications Co.

C# has changed significantly since it was first introduced. With the many upgraded features, C# is more expressive than ever. However, an in depth understanding is required to get the most out of the language.

C# in Depth, Second Edition is a thoroughly revised, up-to-date book that covers the new features of C# 4 as well as Code Contracts. In it, you’ll see the subtleties of C# programming in action, learning how to work with high-value features that you’ll be glad to have in your toolkit. The book helps readers avoid hidden pitfalls of C# programming by understanding “behind the scenes” issues.

Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.


The myths of innovation

Donated by: Mr. Johnson Apacible

Author Scott Berkun
Place of Publication Sebastopol, CA
Date of Publication [2010]
Publisher O’Reilly Media, Inc.

In this new paperback edition of the classic bestseller, you’ll be taken on a hilarious, fast-paced ride through the history of ideas. Author Scott Berkun will show you how to transcend the false stories that many business experts, scientists, and much of pop culture foolishly use to guide their thinking about how ideas change the world. With four new chapters on putting the ideas in the book to work, updated references and over 50 corrections and improvements, now is the time to get past the myths, and change the world.

You’ll have fun while you learn:

  • Where ideas come from
  • The true history of history
  • Why most people don’t like ideas
  • How great managers make ideas thrive
  • The importance of problem finding
  • The simple plan (new for paperback)

Since its initial publication, this classic bestseller has been discussed on NPR, MSNBC, CNBC, and at Yale University, MIT, Carnegie Mellon University, Microsoft, Apple, Intel, Google, Amazon.com, and other major media, corporations, and universities around the world. It has changed the way thousands of leaders and creators understand the world. Now in an updated and expanded paperback edition, it’s a fantastic time to explore or rediscover this powerful view of the world of ideas.

Small, simple, powerful: an innovative book about innovation.” -Don Norman, author of Design of Everyday Things

Insightful, inspiring, evocative, and just plain fun to read… It’s totally great.” -John Seely Brown, Former Director, Xerox Palo Alto Research Center (PARC)

Methodically and entertainingly dismantling the cliches that surround the process of innovation.” -Scott Rosenberg, author of Dreaming in Code; cofounder of Salon.com

Will inspire you to come up with breakthrough ideas of your own.” -Alan Cooper, Father of Visual Basic and author of The Inmates are Running the Asylum

Brimming with insights and historical examples, Berkun’s book not only debunks widely held myths about innovation, it also points the ways toward making your new ideas stick.” -Tom Kelley, GM, IDEO; author of The Ten Faces of Innovation


Brownian motion

Donated by: Mr. Johnson Apacible

Authors Peter Mörters and Yuval Peres
Place of Publication Cambridge, UK
Date of Publication 2010
Publisher Cambridge University Press

This eagerly awaited textbook covers everything the graduate student in probability wants to know about Brownian motion, as well as the latest research in the area. Starting with the construction of Brownian motion, the book then proceeds to sample path properties like continuity and nowhere differentiability. Notions of fractal dimension are introduced early and are used throughout the book to describe fine properties of Brownian paths. The relation of Brownian motion and random walk is explored from several viewpoints, including a development of the theory of Brownian local times from random walk embeddings. Stochastic integration is introduced as a tool and an accessible treatment of the potential theory of Brownian motion clears the path for an extensive treatment of intersections of Brownian paths. An investigation of exceptional points on the Brownian path and an appendix on SLE processes, by Oded Schramm and Wendelin Werner, lead directly to recent research themes.


Building Web reputation systems

Donated by: Mr. Johnson Apacible

Authors F. Randall Farmer and Bryce Glass
Place of Publication Sebastopol, CA
Date of Publication [2010]
Publisher O’Reilly Media, Inc.

What do Amazon’s product reviews, eBay’s feedback score system, Slashdot’s Karma System, and Xbox Live’s Achievements have in common? They’re all examples of successful reputation systems that enable consumer websites to manage and present user contributions most effectively. This book shows you how to design and develop reputation systems for your own sites or web applications, written by experts who have designed web communities for Yahoo! and other prominent sites.

Building Web Reputation Systems helps you ask the hard questions about these underlying mechanisms, and why they’re critical for any organization that draws from or depends on user-generated content. It’s a must-have for system architects, product managers, community support staff, and UI designers.

  • Scale your reputation system to handle an overwhelming inflow of user contributions
  • Determine the quality of contributions, and learn why some are more useful than others
  • Become familiar with different models that encourage first-class contributions
  • Discover tricks of moderation and how to stamp out the worst contributions quickly and efficiently
  • Engage contributors and reward them in a way that gets them to return
  • Examine a case study based on actual reputation deployments at industry-leading social sites, including Yahoo!, Flickr, and eBay

Markov chains and mixing times

Donated by: Mr. Johnson Apacible

Authors David A. Levin, Yuval Peres, Elizabeth L. Wilmer
Place of Publication Providence, Rhode Island
Date of Publication [2009]
Publisher American Mathematical Society

This book is an introduction to the modern approach to the theory of Markov chains. The main goal of this approach is to determine the rate of convergence of a Markov chain to the stationary distribution as a function of the size and geometry of the state space. The authors develop the key tools for estimating convergence times, including coupling, strong stationary times, and spectral methods. Whenever possible, probabilistic methods are emphasized. The book includes many examples and provides brief introductions to some central models of statistical mechanics. Also provided are accounts of random walks on networks, including hitting and cover times, and analyses of several methods of shuffling cards. As a prerequisite, the authors assume a modest understanding of probability theory and linear algebra at an undergraduate level. Markov Chains and Mixing Times is meant to bring the excitement of this active area of research to a wide audience.


The C# programming language, Third edition, Special annotated edition

Donated by: Mr. Johnson Apacible

Author Sean Kelly
Place of Publication Upper Saddle River, NJ
Date of Publication c2009
Publisher Addison-Wesley

“Based on my own experience, I can safely say that every .NET developer who reads this will have at least one ‘aha’ moment and will be a better developer for it.”

–From the Foreword by Don Box

The popular C# programming language combines the high productivity of rapid application development languages with the raw power of C and C++. Now, C# 3.0 adds functional programming techniques and LINQ, Language INtegrated Query. The C# Programming Language, Third Edition, is the authoritative and annotated technical reference for C# 3.0.

Written by Anders Hejlsberg, the language’s architect, and his colleagues, Mads Torgersen, Scott Wiltamuth, and Peter Golde, this volume has been completely updated and reorganized for C# 3.0. The book provides the complete specification of the language, along with descriptions, reference materials, code samples, and annotations from nine prominent C# gurus.

The many annotations–a new feature in this edition–bring a depth and breadth of understanding rarely found in any programming book. As the main text of the book introduces the concepts of the C# language, cogent annotations explain why they are important, how they are used, how they relate to other languages, and even how they evolved.

This book is the definitive, must-have reference for any developer who wants to understand C#.


Effective Java, Second edition

Donated by: Mr. Johnson Apacible

Editor Joshua Bloch
Place of Publication Upper Saddle River, NJ
Date of Publication [2008]
Publisher Addison-Wesley

Are you looking for a deeper understanding of the Java™ programming language so that you can write code that is clearer, more correct, more robust, and more reusable? Look no further! Effective Java™, Second Edition, brings together seventy-eight indispensable programmer’s rules of thumb: working, best-practice solutions for the programming challenges you encounter every day.

This highly anticipated new edition of the classic, Jolt Award-winning work has been thoroughly updated to cover Java SE 5 and Java SE 6 features introduced since the first edition. Bloch explores new design patterns and language idioms, showing you how to make the most of features ranging from generics to enums, annotations to autoboxing.

Each chapter in the book consists of several “items” presented in the form of a short, standalone essay that provides specific advice, insight into Java platform subtleties, and outstanding code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why.

Highlights include:

  • New coverage of generics, enums, annotations, autoboxing, the for-each loop, varargs, concurrency utilities, and much more
  • Updated techniques and best practices on classic topics, including objects, classes, libraries, methods, and serialization
  • How to avoid the traps and pitfalls of commonly misunderstood subtleties of the language
  • Focus on the language and its most fundamental libraries: java.lang, java.util, and, to a lesser extent, java.util.concurrent and java.io

Simply put, Effective Java™, Second Edition, presents the most practical, authoritative guidelines available for writing efficient, well-designed programs.


Google web toolkit applications

Donated by: Mr. Johnson Apacible

Author Ryan Dewsbury
Place of Publication Boston, MA
Date of Publication [2008]
Publisher Pearson Education, Inc.

Ryan clearly understands the GWT value proposition and how GWT integrates into a diverse web technology stack–and not just in a theoretical way. With the popularity of gpokr.com and kdice.com, Ryan can speak with the authority of concrete success.

–Bruce Johnson, creator of Google Web Toolkit

This book distinguishes itself from other books on GWT in that it walks through the entire process of building several nontrivial GWT applications, not the toy applications that most books present.”

–R. Mark Volkmann, Object Computing, Inc.

“Google™ Web Toolkit Applications is an excellent resource for any GWT developer. Solutions to challenges commonly encountered in GWT are presented through the design and development of actual applications. The applications developed throughout the text demonstrate best practices from simple UI design all the way to custom code generation, and are presented with little pretext about the amount of Java knowledge a given developer may have. Advanced concepts are not withheld but are presented in a way that will be understood by both novice and seasoned developers alike. Good application development practices and proper Model View Controller design is reinforced throughout the book, nearly guaranteeing that the reader will come away a better programmer. “

–Jason Essington, Senior Web/Java Engineer, Green River Computing

“Dewsbury’s Google™ Web Toolkit Applications is a book for both experts and beginner programmers who want to discover this open source Java software development framework, as well as write Ajax applications. A very detailed book!”

–Massimo Nardone, Advisory IT Security Architect

Accelerate and Simplify Ajax Development with Google Web Toolkit

Get the edge you need to deliver exceptional user experiences with Google™ Web Toolkit Applications, a guidebook that provides web developers with core information and instructions for creating rich web applications. Whether you’re a developer who needs to build a high-performance front end for Java, PHP, or Ruby applications, or to integrate with external web services, this resource from expert Google Web Toolkit (GWT) developer Ryan Dewsbury delivers the in-depth coverage you’ll need.

In this valuable book, insider Ryan Dewsbury provides instructions for using the robust tool set and gets you on your way to creating first-class web applications by providing a comprehensive overview of GWT technology. In addition, he shares his “in-the-trenches” insights on

  • Building elegant and responsive user interfaces with Cascading Style Sheets and GWT’s Widgets and Panels
  • Creating seamless user experiences through asynchronous communication with HTTP, REST, JSON/JSONP, and RPC Interoperating with web standards–such as XML, RSS, and Atom–and web services–such as Google Maps, Amazon Books, Yahoo! Search, Flickr, and Blogger
  • Overcoming browser security restrictions, such as HTTP’s two-connection limit and the Same-Origin policy
  • Accelerating development, using software engineering, code generation, internationalization, application patterns, and Java tools
  • Deploying for optimal performance with resource compression and caching
  • Building five non-trivial applications: a gadget application with a rich drag-and-drop interface, a multi-search application that makes requests to many search engines, a blog editor application for managing entries across multiple blogs, a web-based instant messenger, and a database manager for a traditional web page

This practical guide to GWT introduces you to the technology; provides techniques, tips, and examples; and puts you on the road to delivering top-notch user experiences for your web applications.


Ajax : the definitive guide

Donated by: Mr. Johnson Apacible

Author Anthony T. Holdener III
Place of Publication Sebastopol, CA
Date of Publication [2008]
Publisher O’Reilly Media, Inc.

Is Ajax a new technology, or the same old stuff web developers have been using for years? Both, actually. This book demonstrates not only how tried-and-true web standards make Ajax possible, but how these older technologies allow you to give sites a decidedly modern Web 2.0 feel.

Ajax: The Definitive Guide explains how to use standards like JavaScript, XML, CSS, and XHTML, along with the XMLHttpRequest object, to build browser-based web applications that function like desktop programs. You get a complete background on what goes into today’s web sites and applications, and learn to leverage these tools along with Ajax for advanced browser searching, web services, mashups, and more. You discover how to turn a web browser and web site into a true application, and why developing with Ajax is faster, easier and cheaper.

The book also explains:

  • How to connect server-side backend components to user interfaces in the browser
  • Loading and manipulating XML documents, and how to replace XML with JSON
  • Manipulating the Document Object Model (DOM)
  • Designing Ajax interfaces for usability, functionality, visualization, and accessibility
  • Site navigation layout, including issues with Ajax and the browser’s back button
  • Adding life to tables & lists, navigation boxes and windows
  • Animation creation, interactive forms, and data validation
  • Search, web services and mash-ups
  • Applying Ajax to business communications, and creating Internet games without plug-ins
  • The advantages of modular coding, ways to optimize Ajax applications, and more

This book also provides references to XML and XSLT, popular JavaScript Frameworks, Libraries, and Toolkits, and various Web Service APIs. By offering web developers a much broader set of tools and options, Ajax gives developers a new way to create content on the Web, while throwing off the constraints of the past. Ajax: The Definitive Guide describes the contents of this unique toolbox in exhaustive detail, and explains how to get the most out of it.


Foundations of security : what every programmer needs to know

Donated by: Mr. Johnson Apacible

Authors Neil Daswani, Christoph Kern, and Anita Kesavan
Place of Publication Berkeley, CA
Date of Publication [2007]
Publisher Apress

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you’re enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today’s software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book.

For the past few years, the Internet has had a “wild, wild west” flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices.

It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.

  • The lead author co-founded the Stanford Center for Professional Development Computer Security Certification.
  • This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities.
  • You’ll receive hands-on code examples for a deep and practical understanding of security.
  • You’ll learn enough about security to get the job done.

Design like you give a damn : architectural responses to humanitarian crises

Donated by: Mr. Johnson Apacible

Editor Architecture for Humanity
Place of Publication London
Date of Publication 2006
Publisher Thames & Hudson

The greatest humanitarian challenge we face today is that of providing shelter. The physical design of our homes, neighborhoods and communities shapes every aspect of our live, yet where architects are most desperately needed, they can least be afforded. Design Like You Give a Damn is a compendium of innovative projects from around the world that demonstrate the power of design to improve lives. It offers a history of the movement toward socially conscious design, and showcases more than 80 contemporary solutions to such urgent needs as basic shelter, healthcare, education and access to clean water, energy and sanitation.


Mastering regular expressions, Third edition

Donated by: Mr. Johnson Apacible

Author Jeffrey E.F. Friedl
Place of Publication Sebastapol, CA
Date of Publication [2006]
Publisher O’Reilly Media, Inc.

Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Perl, Python, Ruby, Java, VB.NET and C# (and any language using the .NET Framework), PHP, and MySQL.

If you don’t use regular expressions yet, you will discover in this book a whole new world of mastery over your data. If you already use them, you’ll appreciate this book’s unprecedented detail and breadth of coverage. If you think you know all you need to know about regularexpressions, this book is a stunning eye-opener.

As this book shows, a command of regular expressions is an invaluable skill. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Regular expressions can save you time and aggravation. They can be used to craft elegant solutions to a wide range of problems. Once you’ve mastered regular expressions, they’ll become an invaluable part of your toolkit. You will wonder how you ever got by without them.

Yet despite their wide availability, flexibility, and unparalleled power, regular expressions are frequently underutilized. Yet what is power in the hands of an expert can be fraught with peril for the unwary. Mastering Regular Expressions will help you navigate the minefield to becoming an expert and help you optimize your use of regular expressions.

Mastering Regular Expressions, Third Edition, now includes a full chapter devoted to PHP and its powerful and expressive suite of regular expression functions, in addition to enhanced PHP coverage in the central “core” chapters. Furthermore, this edition has been updated throughout to reflect advances in other languages, including expanded in-depth coverage of Sun’s java.util.regex package, which has emerged as the standard Java regex implementation.Topics include:

  • A comparison of features among different versions of many languages and tools
  • How the regular expression engine works
  • Optimization (major savings available here!)
  • Matching just what you want, but not what you don’t want
  • Sections and chapters on individual languages

Written in the lucid, entertaining tone that makes a complex, dry topic become crystal-clear to programmers, and sprinkled with solutions to complex real-world problems, Mastering Regular Expressions, Third Edition offers a wealth information that you can put to immediate use.


Professional Ajax

Donated by: Mr. Johnson Apacible

Authors Nicholas C. Zakas, Jeremy McPeak, Joe Fawcett
Place of Publication Indianapolis, IN
Date of Publication [2006]
Publisher Wiley Publishing, Inc.

Ajax is the term used to describe the combination of three hot technology topics CSS, XML, and JavaScript providing faster, more sophisticated Web user interfaces. This work explores the technologies behind Ajax, its various usage models and communication methods, and why the Ajax model is better than the traditional Web model. It discusses Ajax and its practical implementation in a professional Web site/application environment, and examines a variety of server-side languages (such as PHP and .NET), so that readers can get an overview of development issues prior to implementing their own Ajax solutions. It also covers building a Web-based Ajax RSS reader and calling Web services from JavaScript.


Pro C# 2005 and the .NET 2.0 platform, Third edition

Donated by: Mr. Johnson Apacible

Author Andrew Troelsen
Place of Publication Berkeley, CA
Date of Publication [2005]
Publisher Apress

C# 2005 changed the .NET 2.0 landscape. To name just a few improvements, C# now supports generics, partial types and nullable types when youre coding. And the framework boasts improved speed, data access, security, and scalability.

This book has been written to help you assimilate all this new information and realize its potential to make your coding life easier. It will keep you ahead of the curve. To make it easy for you to access this information, the book has been loosely grouped into five sections:

  • 1. Introducing C# 2005 and the .NET 2.0 Platform explains the mechanics of .NET programming and the philosophy that lies behind it
  • 2. The C# Programming Language outlines everything you need to know to start using C# 2005 quickly and efficiently. Object lifetimes, exception handling, genericsits all here
  • 3. Programming with .NET Assemblies deals with one of the most important aspects of .NET programming: reusing code. This book shows you how to capture your code in reuseable external assemblies that you can call upon throughout your applications
  • 4. Programming with the .NET Libraries guides you through them. Of course youre not expected to write every function yourself. The .NET Framework provides a vast array of .NET Libraries containing functionality that allows you to do everything from opening a file-stream to rendering graphical data to the screen
  • 5. Web Applications and XML Web Services concludes the book by taking you away from console-based C# applications and investigating the myriad possibilities that become available when you blend C# 2005 with ASP.NET 2.0 to launch your applications onto the Internet

Beyond bullet points : using Microsoft PowerPoint to create presentations that inform, motivate, and inspire

Donated by: Mr. Johnson Apacible

Author Cliff Atkinson
Place of Publication Redmond, Washington
Date of Publication [2005]
Publisher Microsoft Press

Unload those boring, bullet-riddled slides—and unlock the amazing story buried in your presentation! In BEYOND BULLET POINTS, communications expert Cliff Atkinson shares his innovative three-step system for increasing the impact of your communications with Microsoft PowerPoint. He guides you, step by step, as you discover how to combine the tenets of classic storytelling with the power of the projected media to create a rich, engaging experience. He walks you through his easy-to-use templates, plus 50 advanced tips, to help build your confidence and effectiveness—and quickly bring your ideas to life!

  • FOCUS: Learn how to distill your best ideas into a crisp and compelling narrative.
  • CLARIFY: Use a storyboard to clarify and visualize your ideas, creating the right blend of message and media.
  • ENGAGE:Move from merely reading your slides to creating a rich, connected experience with your audience—and increase your impact!
  • Inside!: See sample storyboards for a variety of presentation types—including investment, sales, educational, and training.

Spidering hacks

Donated by: Mr. Johnson Apacible

Authors Kevin Hemenway and Tara Calishain
Place of Publication Sebastopol, CA
Date of Publication [2004]
Publisher O’Reilly & Associates, Inc.

The Internet, with its profusion of information, has made us hungry for ever more, ever better data. Out of necessity, many of us have become pretty adept with search engine queries, but there are times when even the most powerful search engines aren’t enough. If you’ve ever wanted your data in a different form than it’s presented, or wanted to collect data from several sites and see it side-by-side without the constraints of a browser, then Spidering Hacks is for you.Spidering Hacks takes you to the next level in Internet data retrieval–beyond search engines–by showing you how to create spiders and bots to retrieve information from your favorite sites and data sources. You’ll no longer feel constrained by the way host sites think you want to see their data presented–you’ll learn how to scrape and repurpose raw data so you can view in a way that’s meaningful to you.Written for developers, researchers, technical assistants, librarians, and power users, Spidering Hacks provides expert tips on spidering and scraping methodologies. You’ll begin with a crash course in spidering concepts, tools (Perl, LWP, out-of-the-box utilities), and ethics (how to know when you’ve gone too far: what’s acceptable and unacceptable). Next, you’ll collect media files and data from databases. Then you’ll learn how to interpret and understand the data, repurpose it for use in other applications, and even build authorized interfaces to integrate the data into your own content. By the time you finish Spidering Hacks, you’ll be able to:

  • Aggregate and associate data from disparate locations, then store and manipulate the data as you like
  • Gain a competitive edge in business by knowing when competitors’ products are on sale, and comparing sales ranks and product placement on e-commerce sites
  • Integrate third-party data into your own applications or web sites
  • Make your own site easier to scrape and more usable to others
  • Keep up-to-date with your favorite comics strips, news stories, stock tips, and more without visiting the site every day

Like the other books in O’Reilly’s popular Hacks series, Spidering Hacks brings you 100 industrial-strength tips and tools from the experts to help you master this technology. If you’re interested in data retrieval of any type, this book provides a wealth of data for finding a wealth of data.


Load balancing servers, firewalls, and caches

Donated by: Mr. Johnson Apacible

Author Chandra Kopparapu
Place of Publication New York
Date of Publication [2002]
Publisher John Wiley & Sons, Inc.

From an industry insider–a close look at high-performance, end-to-end switching solutions
Load balancers are fast becoming an indispensable solution for handling the huge traffic demands of the Web. Their ability to solve a multitude of network and server bottlenecks in the Internet age ranges from dramatic improvements in server farm scalability to removing the firewall as a network bottleneck. This book provides a detailed, up-to-date, technical discussion of this fast-growing, multibillion dollar market, covering the full spectrum of topics–from server and firewall load balancing to transparent cache switching to global server load balancing. In the process, the author delivers insight into the way new technologies are deployed in network infrastructure and how they work. Written by an industry expert who hails from a leading Web switch vendor, this book will help network and server administrators improve the scalability, availability, manageability, and security of their servers, firewalls, caches, and Web sites.


Web security, privacy and commerce, Second edition

Donated by: Mr. Johnson Apacible

Authors Simson Garfinkel with Gene Spafford
Place of Publication Sebastopol, CA
Date of Publication [2002]
Publisher O’Reilly Media, Inc.

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy–from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers:

  • Web technology–The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics.
  • Web privacy and security for users–Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users’ own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered.
  • Web server security–Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more.
  • Web content security–Zero in on web publishing issues for content providers, including intellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content.

Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.


Atlas of cyberspace

Donated by: Mr. Johnson Apacible

Authors Martin Dodge and Rob Kitchin
Place of Publication Harlow, England
Date of Publication 2001
Publisher Pearson Education

What does cyberspace ‘look’ like? The Atlas of Cyberspace is the first book to explore the spatial and visual nature of cyberspace and its infrastructure. It examines in accessible style why cyberspace is being mapped and the new cartographic and visualisation techniques being employed. The Atlas is broad in scope, concentrating on the many different aspects of cyberspace such as the Web, chat, email, virtual worlds, and the telecommunications infrastructure that supports cyberspace. It is fully illustrated with over 300 full colour images. Cartographers have been creating maps for centuries. In recent years they have turned their attention to a new realm, cyberspace. For the first time a comprehensive selection of these maps have been collated into one source. Written in layperson’s terms and fully illustrated, the ‘Atlas of Cyberspace’ catalogues thirty year’s worth of maps to reveal the rich and varied landscapes of cyberspace, a landscape occupied by half a billion users and sustaining the information economy. Several different types of maps are detailed.First, a review of maps of the Internet infrastructure showing where the computers are located, how the networks interconnect them and the traffic that flows between them. The book then takes a look at maps of the World-Wide Web, showing how the hyperlink structures and contents of websites are mapped to provide informational landscapes. Next, comes an examination of the ways social interactions between people, using email, chat, bulletin boards, virtual worlds, and games, can be mapped. It concludes with a discussion of the ways in which artists and writers are imagining the visual structure of cyberspace.


Creating the semantic Web with RDF : professional developer’s guide

Donated by: Mr. Johnson Apacible

Author Johan Hjelm
Place of Publication New York
Date of Publication [2001]
Publisher John Wiley & Sons. Inc.

The first state-of-the-art guide for Web developers who need to enable totally new services using metadata This book offers for the first time complete guidance for Web and content developers who use Resource Description Framework (RDF) to create Web services, both wired and wireless, for metadata, or data that is maintained by an application. Written by the W3C Fellow charged with making the W3C XML standard work with other open standards, the book clearly demonstrates how RDF and metadata can greatly improve a user’s Web experience through richer, better-tailored content. The author explains RDF theory and practice and how it compares to XML and HTML in layman terms and provides source code for several important tools. He includes descriptions of real services, both for the desktop computer and the handheld wireless device, and hands-on examples illustrating how metadata is used to tailor services for users. Explanations of how RDF ties in with intelligent agents are also provided.


Schaum’s outline of theory and problems of physics for engineering and science

Donated by: Mr. Johnson Apacible

Author Michael E. Browne
Place of Publication New York
Date of Publication [2001]
Publisher McGraw Hill

Confusing Textbooks? Missed Lectures? Not Enough Time?

Fortunately for you, there’s Schaum’s Outlines. More than 40 million students have trusted Schaum’s to help them succeed in the classroom and on exams. Schaum’s is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills.

This Schaum’s Outline gives you

  • Practice problems with full explanations that reinforce knowledge
  • Coverage of the most up-to-date developments in your course field
  • In-depth review of practices and applications

Fully compatible with your classroom text, Schaum’s highlights all the important facts you need to know. Use Schaum’s to shorten your study time-and get your best test scores!

Schaum’s Outlines-Problem Solved.


The mathematica book, Third edition

Donated by: Mr. Johnson Apacible

Author Stephen Wolfram
Place of Publication Champaign, IL
Date of Publication [1996]
Publisher Wolfram Media/Cambridge University Press

With over a million users around the world, the Mathematica software system created by Stephen Wolfram has defined the direction of technical computing for the past decade. The enhanced text and hypertext processing and state-of-the-art numerical computation features ensure that Mathematica 4 takes scientific computing into the next century. New to this version: visual tour of key features, practical tutorial introduction, full descriptions of 1100 built-in functions, a thousand illustrative examples, easy-to-follow descriptive tables, essays highlighting key concepts, examples of data import and export, award-winning gallery of Mathematica graphics, gallery of mathematical typesetting, dictionary of 700 special characters, a complete guide to the MathLink API, notes on internal implementation, and an index with over 10,000 entries copublished with Wolfram Media.


C++ : the complete reference

Donated by: Mr. Johnson Apacible

Author Herbert Schildt
Place of Publication Berkeley, California
Date of Publication [1991]
Publisher Osborne McGraw-Hill

“C++: The Complete Reference” has been written primarily for C programmers who are moving to C++. However, it covers the whole C++ language. Part one is an overview of all the material that is needed to program in C++ that is common to C. The second part teaches C++ topics not found in C. The third part deals with applications. Finally there are two chapters for software development.


May 4

CIRCULATION BOOKS


The art of software security assessment : identifying and preventing software vulnerabilities

Donated by: Mr. Johnson Apacible

Authors Mark Dowd, John McDonald, and Justin Schuh
Place of Publication Upper Saddle River, NJ
Date of Publication [2007]
Publisher Addison-Wesley

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

—Halvar Flake, CEO and head of research, SABRE Security GmbH

The Definitive Insider’s Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.

The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry’s highest-profile applications.

Coverage includes

  • Code auditing: theory, practice, proven methodologies, and secrets of the trade
  • Bridging the gap between secure software design and post-implementation review
  • Performing architectural assessment: design review, threat modeling, and operational review
  • Identifying vulnerabilities related to memory management, data types, and malformed data
  • UNIX/Linux assessment: privileges, files, and processes
  • Windows-specific issues, including objects and the filesystem
  • Auditing interprocess communication, synchronization, and state
  • Evaluating network software: IP stacks, firewalls, and common application protocols
  • Auditing Web applications and technologies

This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.


Learning Python, Third edition

Donated by: Mr. Johnson Apacible

Author Mark Lutz
Place of Publication Sebastopol, CA
Date of Publication [2008]
Publisher O’Reilly Media, Inc.

Portable, powerful, and a breeze to use, Python is ideal for both standalone programs and scripting applications. With this hands-on book, you can master the fundamentals of the core Python language quickly and efficiently, whether you’re new to programming or just new to Python. Once you finish, you will know enough about the language to use it in any application domain you choose. Learning Python is based on material from author Mark Lutz’s popular training courses, which he’s taught over the past decade. Each chapter is a self-contained lesson that helps you thoroughly understand a key component of Python before you continue. Along with plenty of annotated examples, illustrations, and chapter summaries, every chapter also contains Brain Builder, a unique section with practical exercises and review quizzes that let you practice new skills and test your understanding as you go. This book covers: Types and Operations — Python’s major built-in object types in depth: numbers, lists, dictionaries, and more Statements and Syntax — the code you type to create and process objects in Python, along with Python’s general syntax model Functions — Python’s basic procedural tool for structuring and reusing code Modules — packages of statements, functions, and other tools organized into larger components Classes and OOP — Python’s optional object-oriented programming tool for structuring code for customization and reuse Exceptions and Tools — exception handling model and statements, plus a look at development tools for writing larger programs. Learning Python gives you a deep and complete understanding of the language that will help you comprehend any application-level examples of Python that you later encounter. If you’re ready to discover what Google and YouTube see in Python, this book is the best way to get started.


Information retrieval : algorithms and heuristics, Second edition

Donated by: Mr. Johnson Apacible

Authors David A. Grossman and Ophir Frieder
Place of Publication Dordrecht, The Netherlands
Date of Publication [2004]
Publisher Springer

Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked against a document collection using either a single or a combination of retrieval strategies, and how an assortment of utilities are integrated into the query processing scheme to improve these rankings. Methods for building and compressing text indexes, querying and retrieving documents in multiple languages, and using parallel or distributed processing to expedite the search are likewise described. This edition is a major expansion of the one published in 1998. Besides updating the entire book with current techniques, it includes new sections on language models, cross-language information retrieval, peer-to-peer processing, XML search, mediators, and duplicate document detection.


Introduction to automata theory, languages, and computation

Donated by: Mr. Johnson Apacible

Authors John E. Hopcroft, Jeffrey D. Ullman
Place of Publication Reading, Mass.
Date of Publication [1979]
Publisher Addison-Wesley Publishing Company

This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments. (amazon review)


Tensor calculus and analytical dynamics

Donated by: Mr. Johnson Apacible

Author John G. Papastavridis
Place of Publication Boca Raton, Fla.
Date of Publication [1999]
Publisher CRC Press

Tensor Calculus and Analytical Dynamics provides a concise, comprehensive, and readable introduction to classical tensor calculus – in both holonomic and nonholonomic coordinates – as well as to its principal applications to the Lagrangean dynamics of discrete systems under positional or velocity constraints. The thrust of the book focuses on formal structure and basic geometrical/physical ideas underlying most general equations of motion of mechanical systems under linear velocity constraints.
Written for the theoretically minded engineer, Tensor Calculus and Analytical Dynamics contains uniquely accessbile treatments of such intricate topics as:

  • tensor calculus in nonholonomic variables
  • Pfaffian nonholonomic constraints
  • related integrability theory of Frobenius

The book enables readers to move quickly and confidently in any particular geometry-based area of theoretical or applied mechanics in either classical or modern form.


Customer intelligence : from data to dialogue

Donated by: Mr. Johnson Apacible

Author Sean Kelly
Place of Publication Chichester, West Sussex, England
Date of Publication [2006]
Publisher John Wiley & Sons Ltd

Developed from the authors’ experience working with firms seeking to build better business intelligence, Customer Intelligence is concerned with who will own and control information about customers and who will develop the best skills and capabilities to exploit it for competitive advantage. At its core, it attempts to explain why the “age of information” has failed to live up to its own hype of specialization, personalization over homogenization, and consistently satisfying customers.


Graphics gems II

Donated by: Mr. Johnson Apacible

Editor James Arvo
Place of Publication Boston
Date of Publication c1991
Publisher AP Professional

Graphics Gems II is a collection of articles shared by a diverse group of people that reflect ideas and approaches in graphics programming which can benefit other computer graphics programmers.

This volume presents techniques for doing well-known graphics operations faster or easier. The book contains chapters devoted to topics on two-dimensional and three-dimensional geometry and algorithms, image processing, frame buffer techniques, and ray tracing techniques. The radiosity approach, matrix techniques, and numerical and programming techniques are likewise discussed.

Graphics artists and computer programmers will find the book invaluable.


Leadership on the line : staying alive through the dangers of leading

Donated by: Mr. Johnson Apacible

Authors Ronald A. Heifetz, Marty Linsky
Place of Publication Boston
Date of Publication 2002
Publisher Harvard Business School Press

Named one of 100 Leadership & Success Books to Read in a Lifetime by Amazon Editors

To lead is to live dangerously. It’s romantic and exciting to think of leadership as all inspiration, decisive action, and rich rewards, but leading requires taking risks that can jeopardize your career and your personal life. It requires putting yourself on the line, disturbing the status quo, and surfacing hidden conflict. And when people resist and push back, there’s a strong temptation to play it safe. Those who choose to lead plunge in, take the risks, and sometimes get burned. But it doesn’t have to be that way say renowned leadership authorities Ronald Heifetz and Marty Linsky. In Leadership on the Line, they show how it’s possible to make a difference without getting “taken out” or pushed aside. They present everyday tools that give equal weight to the dangerous work of leading change and the critical importance of personal survival. Through vivid stories from all walks of life, the authors present straightforward strategies for navigating the perilous straits of leadership. Whether parent or politician, CEO or community activist, this practical book shows how you can exercise leadership and survive and thrive to enjoy the fruits of your labor.


Perl 5 desktop reference

Donated by: Mr. Johnson Apacible

Author Johan Vromans
Place of Publication Cambridge
Date of Publication [1996]
Publisher O’Reilly & Associates Inc.

This “official” quick-reference guide to the Perl programming language has been enlarged to provide a summary of Perl syntax rules, a complete list of standard library modules with brief descriptions, and a precedence table for Perl operators. The guide is current with Perl version 5.003.Perl, having previously established itself as the UNIX scripting tool of choice, is establishing itself as the tool of choice in numerous programming spheres, ranging from the World Wide Web to general-purpose programming. Perl combines in one language virtually all the functionality of the C, sed, and awk programming languages, as well as many functions of a shell.The Perl 5 Desktop Reference provides a complete overview of Perl, from variables to input and output, from flow control to regular expressions — all packaged into a convenient, carry-around guide that can easily be inserted into your favorite Perl programming manual.


Anti-hacker tool kit

Donated by: Mr. Johnson Apacible

Authors Keith J. Jones, Mike Shema, Bradley C. Johnson
Place of Publication Berkeley, California
Date of Publication [2002]
Publisher McGraw-Hill/Osborne

Get in–depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.


Effective Perl programming : writing better programs with Perl

Donated by: Mr. Johnson Apacible

Authors Joseph N. Hall, with Randal L. Schwartz
Place of Publication Reading, Massachusetts
Date of Publication [1998]
Publisher Addison Wesley Longman, Inc.

Perl experts Joseph Hall and Randal Schwartz share sixty concise lessons, focusing on programming techniques, pointers, rules of thumb, and the pitfalls to avoid, enabling students to make the most of Perl’s power and capabilities. Through their advice, they help students develop a knack for the right ways to do things. They show how to solve problems with Perl, and how to debug and improve Perl programs. Through examples, they help you learn good Perl style. Geared for students who have already acquired Perl basics, the book will extend students’ skill range, giving them the tactics and deeper understanding they need to create Perl programs that are more elegant, effective, and succinct. The book also speaks to those who want to become more fluent, expressive, and individualistic Perl programmers. The author maintains a substantial companion website at http://www.effectiveperl.com.


BGP

Donated by: Mr. Johnson Apacible

Author Iljitsch van Beijnum
Place of Publication Sebastopol, CA
Date of Publication [2002]
Publisher O’Reilly & Associates, Inc.

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet’s size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.The topics include:

  • Requesting an AS number and IP addresses
  • Route filtering by remote ISPs and how to avoid this
  • Configuring the initial BGP setup
  • Balancing the available incoming or outgoing traffic over the available connections
  • Securing and troubleshooting BGP
  • BGP in larger networks: interaction with internal routing protocols, scalability issues
  • BGP in Internet Service Provider networks

The book is filled with numerous configuration examples with more complex case studies at the end of the book to strengthen your understanding. BGP is for anyone interested in creating reliable connectivity to the Internet.


May 3

CIRCULATION BOOKS


Cloud computing bible

Donated by: Mr. Johnson Apacible

Author Barrie Sosinsky
Place of Publication Indianapolis, IN
Date of Publication [2011]
Publisher Wiley Publishing, Inc.

The complete reference guide to the hot technology of cloud computing

Its potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you?ll be using or implementing cloud computing.

  • Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularity is expected to skyrocket when Microsoft introduces Office Web Apps
  • This comprehensive guide helps define what cloud computing is and thoroughly explores the technologies, protocols, platforms and infrastructure that make it so desirable
  • Covers mobile cloud computing, a significant area due to ever-increasing cell phone and smartphone use
  • Focuses on the platforms and technologies essential to cloud computing

Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible.


Discovery-driven growth : a breakthrough process to reduce risk and seize opportunity

Donated by: Mr. Johnson Apacible

Authors Rita Gunther McGrath, Ian C. MacMillan
Place of Publication Boston, Massachusetts
Date of Publication [2009]
Publisher Harvard Business Press

You’ve been charged with growing your business. Incremental growth can no longer deliver the results you need. You need truly dynamic growth – and you need to achieve it without risking a hugely expensive gamble. How can you encourage innovative new ventures and pursue ambitious growth while minimizing risk?

In Discovery-Driven Growth, authors McGrath and MacMillan show how companies can plan and pursue an aggressive growth agenda with confidence. By carefully framing their strategic growth opportunities, testing each project assumption against a series of checkpoints, and creating a culture that acts on evidence and learning instead of blind stumbling, companies can better control their costs, minimize surprises, and know when to disengage from questionable projects–before it’s too late.

Providing tools that will help you select and better assess the potential of any strategic venture, from new product lines to entirely new businesses, the authors outline a comprehensive process that lets you identify, manage, and leverage your company’s full portfolio of opportunities. By reducing up-front costs and eliminating unnecessary risks, you’ll be able to avoid missteps and explore more options to create the breakthrough growth that your business requires.


Facebook marketing : leverage social media to grow your business

Donated by: Mr. Johnson Apacible

Author Steven Holzner
Place of Publication Copyright Notice Indianapolis, Indiana
Date of Publication [2009]
Publisher Que

Profit from Facebook!

High-Impact, Low-Cost Social Marketing That Works!

With more than 80,000,000 affluent, savvy members, Facebook is today’s fastest-growing marketing opportunity! But traditional marketing methods won’t work here. In Facebook Marketing, best-selling author Steven Holzner reveals new social marketing techniques that do work, and shows you exactly how to make the most of them. Using true case studies, Holzner introduces powerful new techniques from today’s smartest Facebook marketers…and helps you avoid pitfalls that can cost you money and credibility. No matter what business you’re in, you’ll learn how to create bottom-up, “viral” Facebook marketing programs that achieve maximum results at minimum cost!

  • Crafting your Facebook profile for maximum impact
  • Getting into the Facebook community: crucial dos and don’ts
  • Joining the right Facebook Groups—or starting your own
  • Creating a Facebook blog that attracts paying customers
  • Promoting products and services with free Facebook Marketplace classifieds
  • Hosting your own Facebook events: from company picnics to concerts
  • Successfully advertising on Facebook, without overspending
  • Promoting your business within today’s most popular Facebook applications
  • Tracking the results of your advertising
  • Using brand-new viral video marketing techniques
  • Driving even more Web traffic to your Facebook pages
  • Building your own Facebook applications

Digital telephony

Donated by: Mr. Johnson Apacible

Author John Bellamy
Place of Publication New York
Date of Publication [1982]
Publisher Wiley-Interscience

An introduction to the new digital techniques of telephone communication networks, with emphasis on voice applications: voice digitization, digital transmission, digital switching, network synchronization, network control, and network analysis. Presents basic theory and stresses the application and operational aspects of communication systems design. Relates system level design considerations to telephone networks around the world, particularly in North America.


JavaScript : the definitive guide, Fifth edition

Donated by: Mr. Johnson Apacible

Author David Flanagan
Place of Publication Sebastopol, California
Date of Publication [2006]
Publisher O’Reilly Media, Inc.

This Fifth Edition is completely revised and expanded to cover JavaScript as it is used in today’s Web 2.0 applications. This book is both an example-driven programmer’s guide and a keep-on-your-desk reference, with new chapters that explain everything you need to know to get the most out of JavaScript, including:

  • Scripted HTTP and Ajax
  • XML processing
  • Client-side graphics using the canvas tag
  • Namespaces in JavaScript–essential when writing complex programs
  • Classes, closures, persistence, Flash, and JavaScript embedded in Java applications

Part I explains the core JavaScript language in detail. If you are new to JavaScript, it will teach you the language. If you are already a JavaScript programmer, Part I will sharpen your skills and deepen your understanding of the language.

Part II explains the scripting environment provided by web browsers, with a focus on DOM scripting with unobtrusive JavaScript. The broad and deep coverage of client-side JavaScript is illustrated with many sophisticated examples that demonstrate how to:

  • Generate a table of contents for an HTML document
  • Display DHTML animations
  • Automate form validation
  • Draw dynamic pie charts
  • Make HTML elements draggable
  • Define keyboard shortcuts for web applications
  • Create Ajax-enabled tool tips
  • Use XPath and XSLT on XML documents loaded with Ajax
  • And much more

Part III is a complete reference for core JavaScript. It documents every class, object, constructor, method, function, property, and constant defined by JavaScript 1.5 and ECMAScript Version 3.

Part IV is a reference for client-side JavaScript, covering legacy web browser APIs, the standard Level 2 DOM API, and emerging standards such as the XMLHttpRequest object and the canvas tag.

More than 300,000 JavaScript programmers around the world have madethis their indispensable reference book for building JavaScript applications.

“A must-have reference for expert JavaScript programmers…well-organized and detailed.”
– Brendan Eich, creator of JavaScript


Only the paranoid survive : how to exploit the crisis points that challenge every company and career

Donated by: Mr. Johnson Apacible

Author Andrew S. Grove
Place of Publication New York
Date of Publication 1996
Publisher Currency Doubleday

Under Andy Grove’s leadership, Intel has become the world’s largest chipmaker, the fifth-most-admired company in America, and the seventh-most-profitable company among the Fortune 500. You don’t achieve rankings like these unless you have mastered a rare understanding of the art of business and an unusual way with its practice.

Few CEOs can claim this level of consistent record-breaking success. Grove attributes much of this success to the philosophy and strategy he reveals in Only the Paranoid Survive–a book that is unique in leadership annals for offering a bold new business measure, and for taking the reader deep inside the workings of a major corporation. Grove’s contribution to business thinking concerns a new way of measuring the nightmare moment every leader dreads–the moment when massive change occurs and all bets are off. The success you had the day before is gone, destroyed by unforeseen changes that hit like a stage-six rapid. Grove calls such moments Strategic Inflection Points, and he has lived through several. When SlPs hit, all rules of business shift fast, furiously, and forever. SlPs can be set off by almost anything–megacompetition, an arcane change in regulations, or a seemingly modest change in technology.

Yet in the watchful leader’s hand, SlPs can be an ace. Managed right, a company can turn a SIP into a positive force to win in the marketplace and emerge stronger than ever.

To achieve that level of mastery over change, you must know its properties inside and out. Grove addresses questions such as these: What are the stages of these tidal waves? What sources do you turn to in order to foresee dangers before trouble announces itself? When threats abound, how do you deal with your emotions, your calendar, your career–as well as with your most loyal managers and customers, who may cling to tradition?

No stranger to risk, Grove examines his own record of success and failure, including the drama of how he navigated the events of the Pentium flaw, which threatened Intel in a major way, and how he is dealing with the SIP brought on by the Internet. The work of a lifetime of reflection, Only the Paranoid Survive is a contemporary classic of leadership skills.


Trends in functional programming : 14th International Symposium, TFP 2013, Provo, UT, USA, May 14-16, 2013

Donated by: Mr. Johnson Apacible

Editor Jay McCarthy
Place of Publication Berlin, Heidelberg
Date of Publication 2013
Publisher Springer Berlin Heidelberg

This book constitutes the thoroughly refereed revised selected papers of the 14th International Symposium on Trends in Functional Programming, TFP 2013, held in Provo, UT, USA in May 2013. The 10 revised full papers included in this volume were carefully and selected from 27 submissions. They cover topics such as distributed systems, education, functional language implementation, hardware synthesis, static analysis, testing and total programming.


The fourth paradigm : data-intensive scientific discovery

Donated by: Mr. Johnson Apacible

Editors Tony Hey, Stewart Tansley, and Kristin Tolle
Place of Publication Redmond, Washington
Date of Publication [2009]
Publisher Microsoft Research

This book presents the first broad look at the rapidly emerging field of data-intensive science, with the goal of influencing the worldwide scientific and computing research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud-computing technologies. This collection of essays expands on the vision of pioneering computer scientist Jim Gray for a new, fourth paradigm of discovery based on data-intensive science and offers insights into how it can be fully realized.


Creating research and scientific documents with Microsoft Word

Donated by: Mr. Johnson Apacible

Authors Alexander V. Mamishev, Murray Sargent
Place of Publication Redmond, Washington
Date of Publication [2013]
Publisher Microsoft Press

Research fuels innovation–and with this focused guide to Microsoft Word, you can help increase your team’s collaborative power and effectiveness, and bring new research to life. Writing proposals, reports, journal articles, theses, and other technical documents as a team poses unique challenges, not the least of which is consistent presentation and voice. You must also manage the formatting and accuracy of figures, equations, and citations, and comply with the style rules of external publications. In this book you’ll learn from the authors’ extensive experience managing the authoring and publication of technical content, and gain specific practices and templates you can apply right away.

  • Focuses on the unique challenges of writing and producing documents in an academic or commercial R&D setting
  • Demonstrates how to use Microsoft Word to increase the quality of collaborative document preparation–including formatting, editing, citations management, commenting, and version control
  • Includes downloadable templates (streemtoolsonline.org) that help automate creation of scientific documents
  • Offers best-practices guidance for writing in teams and writing in the scientific genre

Pitch perfect : how to say it right the first time, every time

Donated by: Mr. Johnson Apacible

Authors Bill McGowan and Alisa Bowman
Place of Publication New York, NY
Date of Publication [2014]
Publisher Harper Business

Media guru and Emmy Award-winning correspondent Bill McGowan—coach to some of the biggest names in business and entertainment, including Eli Manning, Kelly Clarkson, Jack Welch, Thomas Keller and Kenneth Cole teaches you how to get your message across and get what you want with pitch perfect communication. He is also a trusted advisor in the C-suites of tech companies like, Facebook, Spotify, AirBnB, Dropbox and Salesforce.com.

Saying the right thing the right way can make the difference between sealing the deal or losing the account, getting a promotion, or getting a pink slip. It’s essential to be pitch perfect—to get the right message across to the right person at the right time. In Pitch Perfect, Bill McGowan shows you how to craft the right message and deliver it using the right language—both verbal and nonverbal.

Pitch Perfect teaches you how to overcome common communication pitfalls using McGowan’s simple Principles of Persuasion, which are highly effective and easy to learn, implement, and master. With Pitch Perfect you can harness the power of persuasion and have people not only listening closely to your every word but also remembering you long after you’ve left the room.


Core Java, volume 1-Fundamentals, Eighth edition

Donated by: Mr. Johnson Apacible

Authors Cay S. Horstmann, Gary Cornell
Place of Publication Upper Saddle River, NJ
Date of Publication [2008]
Publisher Prentice Hall/Sun Microsystems Press

This revised edition of the classic Core Java™, Volume I–Fundamentals , is the definitive guide to Java for serious programmers who want to put Java to work on real projects.

Fully updated for the new Java SE 6 platform, this no-nonsense tutorial and reliable reference illuminates the most important language and library features with thoroughly tested real-world examples. The example programs have been carefully crafted to be easy to understand as well as useful in practice, so you can rely on them as an outstanding starting point for your own code.

Volume I is designed to quickly bring you up to speed on what’s new in Java SE 6 and to help you make the transition as efficiently as possible, whether you’re upgrading from an earlier version of Java or migrating from another language. The authors concentrate on the fundamental concepts of the Java language, along with the basics of user-interface programming. You’ll find detailed, insightful coverage of

  • Java fundamentals
  • Object-oriented programming
  • Interfaces and inner classes
  • Reflection and proxies
  • The event listener model
  • GUI programming with Swing
  • Packaging applications
  • Exception handling
  • Logging and debugging
  • Generic programming
  • The collections framework
  • Concurrency

For detailed coverage of XML processing, networking, databases, internationalization, security, advanced AWT/Swing, and other advanced features, look for the forthcoming eighth edition of Core Java™, Volume II—Advanced Features (ISBN: 978-0-13-235479-0).


The Annotated C++ reference manual

Donated by: Mr. Johnson Apacible

Authors Margaret A. Ellis, Bjarne Stroustrup
Place of Publication Reading, Massachusetts
Date of Publication [1990]
Publisher Addison-Wesley Publishing Company

This book provides a complete reference for the C++ programming language. It consists of the C++ reference manual, approved as the base document for ANSI standardization of the language, plus annotations and commentary. The annotations and commentary discuss what is not included in the language, why certain features are defined as they are, and how one might implement particular features. The commentaries also help the reader to understand the relationships between parts of the language. Comparisons with C and examples explain the more subtle points of the language. Sixteen chapters cover the latest version of C++ including multiple inheritance, abstract classes, templates, exception handling, and more. A final chapter describes resolutions by the ANSI/ISO committee including new features such as run-time type information and namespaces. Appendices summarize the grammar and evolution of the language, and explain in detail the differences between C and C++. The Annotated C++ Reference Manual will appeal to language implementors and expert C++ programmers.


Algorithm design

Donated by: Mr. Johnson Apacible

Authors Jon Kleinberg, Eva Tardos
Place of Publication Boston
Date of Publication [2006]
Publisher Pearson/Addison-Wesley

Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches students a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science.

Features

  • Focus on problem analysis and design techniques.
  • Discussion is grounded in concrete problems and examples rather than abstract presentation of principles, with representative problems woven throughout the text.
  • Over 200 well crafted problems from companies such as Yahoo!® and Oracle®. Each problem has been class tested for usefulness and accuracy in the authors’ own undergraduate algorithms courses.
  • Broad coverage of algorithms for dealing with NP-hard problems and the application of randomization, increasingly important topics in algorithms.

The strategy paradox : why committing to success leads to failure, and what to do about it

Donated by: Mr. Johnson Apacible

Author Michael E. Raynor
Place of Publication New York
Date of Publication 2007
Publisher Currency Doubleday

A compelling vision. Bold leadership. Decisive action. Unfortunately, these prerequisites of success are almost always the ingredients of failure, too. In fact, most managers seeking to maximize their chances for glory are often unwittingly setting themselves up for ruin. The sad truth is that most companies have left their futures almost entirely to chance, and don’t even realize it. The reason? Managers feel they must make choices with far-reaching consequences today, but must base those choices on assumptions about a future they cannot predict. It is this collision between commitment and uncertainty that creates THE STRATEGY PARADOX.

This paradox sets up a ubiquitous but little-understood tradeoff. Because managers feel they must base their strategies on assumptions about an unknown future, the more ambitious of them hope their guesses will be right – or that they can somehow adapt to the turbulence that will arise. In fact, only a small number of lucky daredevils prosper, while many more unfortunate, but no less capable managers find themselves at the helms of sinking ships. Realizing this, even if only intuitively, most managers shy away from the bold commitments that success seems to demand, choosing instead timid, unremarkable strategies, sacrificing any chance at greatness for a better chance at mere survival.

Michael E. Raynor, coauthor of the bestselling The Innovator’s Solution, explains how leaders can break this tradeoff and achieve results historically reserved for the fortunate few even as they reduce the risks they must accept in the pursuit of success. In the cutthroat world of competitive strategy, this is as close as you can come to getting something for nothing.

Drawing on leading-edge scholarship and extensive original research, Raynor’s revolutionary principle of Requisite Uncertainty yields a clutch of critical, counter-intuitive findings. Among them:

  • The Board should not evaluate the CEO based on the company’s performance, but instead on the firm’s strategic risk profile
  • The CEO should not drive results, but manage uncertainty
  • Business unit leaders should not focus on execution, but on making strategic choices
  • Line managers should not worry about strategic risk, but devote themselves to delivering on commitments

With detailed case studies of success and failure at Sony, Microsoft, Vivendi Universal, Johnson & Johnson, AT&T and other major companies in industries from financial services to energy, Raynor presents a concrete framework for strategic action that allows companies to seize today’s opportunities while simultaneously preparing for tomorrow’s promise.


Building search applications : Lucene, LingPipe, and Gate

Donated by: Mr. Johnson Apacible

Author Manu Konchady
Place of Publication Oakton, Virginia
Date of Publication [2008]
Publisher Mustru Publishing

Lucene, LingPipe, and Gate are popular open source tools to build powerful search applications. Building Search Applications describes functions from Lucene that include indexing, searching, ranking, and spelling correction to build search engines. With this book you will learn to: Extract tokens from text using custom tokenizers and analyzers from Lucene, LingPipe, and Gate. Construct a search engine index with an optional backend database to manage large document collections. Explore the wide range of Lucene queries to search an index, understand the ranking algorithm for a query, and suggest spelling corrections. Find the names of people, places, and other entities in text using LingPipe and Gate. Categorize documents by topic using classifiers and build groups of self-organized documents using clustering algorithms from LingPipe. Create a Web crawler to scan the Web, Intranet, or desktop using Nutch. Track the sentiment of articles published on the Web with LingPipe.


May 2

Time

Place of Publication New York
Date of Publication Vol. 187, no. 12 : April 4, 2016
Publisher Time Inc.


Time

Place of Publication New York
Date of Publication Vol. 187, no. 13 : April 11, 2016
Publisher Time Inc.


Time

Place of Publication New York
Date of Publication Vol. 187, no. 14 : April 18, 2016
Publisher Time Inc.


Time

Place of Publication New York
Date of Publication Vol. 187, no. 15 : April 25, 2016
Publisher Time Inc.


Time

Place of Publication New York
Date of Publication Vol. 187, no. 16-17 : May 2/ May 9, 2016
Publisher Time Inc.


Reader’s Digest

Place of Publication Shaukiwan, Hong Kong
Date of Publication Vol. 108, no. 638 : April 2016
Publisher Reader’s Digest Association Far East