Programming and scripting languages: general Books
John Wiley & Sons Inc Introduction to Engineering Programming
Book SynopsisClick here to read ACCU''s review of this book.This text is an indispensable collection of four tutorials covering concepts in modern engineering computations, and engineering programming in ANSI C, MATLAB Version 5 and Java 1.1.Table of ContentsCONCEPTS IN MODERN ENGINEERING COMPUTATIONS. Introduction to Engineering Computations. Principles of Engineering Software Development. C PROGRAMMING TUTORIAL. Getting Started. Basic Data Types and Variables. Operators and Expressions. Control of Flow. Functions I. Arrays and Pointers. Functions II. Dynamic Allocation of Memory. The C Preprocessor. Input and Output. MATLAB PROGRAMMING TUTORIAL. Introduction to MATLAB. MATLAB Graphics. Solution of Linear Matrix Equations. JAVA PROGRAMMING TUTORIAL. Introduction to Java. Object-Oriented Program Design. The Java Language. Java Graphics. Appendices. References. Index.
£163.76
John Wiley & Sons Inc Karel
Book SynopsisUsing the same format that has become so popular in Pascal, Karel the Robot has now become object-oriented. This book is intended to teach novice programmers the fundamentals of object-oriented programming. It accomplishes this goal with an analog equivalent of C++ that allows introductory computer science students to work through a programming project from start to finish.The book opens by explaining the elaborate Robot world that Karel lives in, a world filled with objects. The text continues this strong metaphor throughout. Through the metaphor, students learn the art of solving programming problems in an object-oriented paradigm.This text is suitable for any introductory or second course in computer science where C++ is used.Table of ContentsThe Robot World. Primitive Instructions and Simple Programs. Extending the Robot Programming Language. Conditionally Executing Instructions. Instructions That Repeat. Advanced Techniques for Robots. Appendices.
£68.36
John Wiley & Sons Inc Statistical Mechanics
Book SynopsisStatistical Mechanics reflects the latest techniques and developments in statistical mechanics. Covering a variety of concepts and topics - molecular dynamic methods, renormalization theory, chaos, polymer chain folding, oscillating chemical reactions, and cellular automata. 15 computer programs written in FORTRAN are provided to illustrate the concepts as well as more than 100 chapter-end exercises.Trade Review"...a course based on the book will expose the richness and beauty of statistical mechanics to the students and...incite their curiosity for further study and research in this fascinating field." (Zentralblatt MATH, Vol. 973, 2001/23)Table of ContentsESSENTIALS. Classical Statistical Mechanics. Quantum Statistical Mechanics. EQUILIBRIUM STATISTICAL MECHANICS. Phase Transitions and Critical Phenomena. The Liquid State. Molecular Dynamics Methods. Monte Carlo Methods. Polymers, Proteins, and Spin Glass Models. NONEQUILIBRIUM STATISTICAL MECHANICS. The Boltzmann Equation. Approaches to Brownian Motion. Zwanzig-Mori Formalism. Activated Barrier-Crossing Problem. Oscillating Chemical Reactions and Chaos. Introduction to Cellular Automation Models. Appendices. Bibliography. Indexes.
£149.35
John Wiley & Sons Inc Fundamentals
Book SynopsisThis book examines the solution of some of the most common problems of numerical computation. By concentrating on one effective algorithm for each basic task, it develops the fundamental theory in a brief, elementary way. There are ample exercises, and codes are provided to reduce the time otherwise required for programming and debugging.Table of ContentsErrors and Floating Point Arithmetic. Systems of Linear Equations. Interpolation. Roots of Nonlinear Equations. Numerical Integration. Ordinary Differential Equations. Appendix. Answers to Selected Exercises. Index.
£192.85
John Wiley & Sons Inc Automating Science and Engineering Laboratories
Book SynopsisWith computer technologies increasingly taking over many laboratory tasks, laboratory professionals are often faced with the dilemma of having to build customized computer applications without prior training in programming.Table of ContentsVISUAL BASIC(r) AND THE INTEGRATED DEVELOPMENT ENVIRONMENT. Background. IDE Fundamentals. A Review of the Visual Basic(r) Language. The Structure of a Visual Basic(r) Application. Object-Oriented Programming in Visual Basic(r). DEVICE COMMUNICATIONS. Introducing the Virtual Instrument. Dynamic Data Exchange. Using Dynamic Data Exchange in Visual Basic(r). RS-232 Communications. RS-232 Communications in Visual Basic(r). TCP/IP Networking. TCP/IP Networking in Visual Basic(r). File Communications. DEVICE CONTROL AND DATA HANDLING. Multithreading. Multithreading in Visual Basic(r). Concepts of State. State Machines-Implementing State Diagrams in Visual Basic(r). Parsing-Understanding Message Content. A Visual Basic(r) Parser Class. Device Monitoring and Control. Device Controllers in VB. GRAPHICAL INTERFACES AND DATA PRESENTATION. Scientific Plotting with MSChart. Tabular Data Display and Editing. Visual Basic(r) Graphics Fundamentals. Active Graphic Displays. Interactive Graphic Displays. Appendices. Index.
£52.16
John Wiley & Sons Inc Programming with Objects
Book SynopsisPROGRAMMING WITH OBJECTS Your essential comparative approach to learning C++ and Java Programming with Objects: A Comparative Presentation of Object-Oriented Programming with C++ and Java, a comparative presentation of object-oriented programming with two of the most popular programming languages of today, teaches vital skills and techniques for the Internet age. Based on highly successful courses taught by the author, this book answers the need for a comprehensive educational program on the subject of object-oriented programming. In a clear and accessible format, the author compares and contrasts both languages, from basic language constructs to how both languages are used in application-level programming, such as graphics programming, network programming, and database programming. Since both C++ and Java were born out of the same language, C, learning these two languages together has several distinct advantages: Because they have much in common aTrade Review"...a wonderful volume...a very worthwhile read...essential..." (Choice, September 2003)Table of ContentsWhy OO Programming - Some Parallels with Things at Large. Baby Steps. The Notion of a Class and Some Other Key Ideas. Strings. Using the Container Classes. The Primitive Types and Their Input/Output. Declarations, Definitions, and Initializations. Object Reference and Memory Allocation. Functions and Methods. Handling Exceptions. Classes, The Rest of the Story. Overloading Operators in C++. Generics and Templates. Modeling Diagrams for OO Programs. Extending Classes. Multiple Inheritance in C++. OO for Graphical User Interfaces, A Tour of Three Toolkits. Multithreaded Object-Oriented Programming. Network Programming. Database Programming.
£99.86
John Wiley & Sons Inc Computer Science
Book SynopsisProvides a solid integration of basic computing concepts with Pascal programming to foster the use of programming as a problem-solving tool. Topics run the gamut from algorithms and artificial intelligence to computer interfacing and operating systems. Every chapter begins with an intriguing photograph and an activity posing a problem to be solved.Table of ContentsProblem-Solving Concepts. Elements of the Pascal Language. Computer Logic and Architecture. Modules and Control Structures. Operating Systems. Arrays. Data Communications. String Processing. Software Engineering. Data Structures. Databases. Dynamic Lists. Programming Languages. Recursive Algorithms. Searching and Sorting Algorithms. Numerical Algorithms. Theoretical Perspectives in Computing. Artificial Intelligence. Appendices. Answers to Selected Exercises. Index.
£163.35
John Wiley & Sons Inc Objects Abstraction Data Structures and Design
Book SynopsisKoffman and Wolfgang introduce data structures in the context of C++ programming. They embed the design and implementation of data structures into the practice of sound software design principles that are introduced early and reinforced by 20 case studies. Data structures are introduced in the C++ STL format whenever possible. Each new data structure is introduced by describing its interface in the STL. Next, one or two simpler applications are discussed then the data structure is implemented following the interface previously introduced. Finally, additional advanced applications are covered in the case studies, and the cases use the STL. In the implementation of each data structure, the authors encourage students to perform a thorough analysis of the design approach and expected performance before actually undertaking detailed design and implementation. Students gain an understanding of why different data structures are needed, the applications they are suited for, and the advantTable of ContentsPreface iii Chapter P A C++ Primer 1 P.1 The C++ Environment 2 P.2 Preprocessor Directives and Macros 7 P.3 C++ Control Statements 12 P.4 Primitive Data Types and Class Types 16 P.5 Objects, Pointers, and References 23 P.6 Functions 29 P.7 Arrays and C Strings 33 P.8 The string Class 38 P.9 Input/Output Using Streams 44 Chapter Review, Exercises, and Programming Projects 59 Chapter 1 Introduction to Software Design 63 1.1 The Software Life Cycle 64 1.2 Using Abstraction to Manage Complexity 73 1.3 Defining C++ Classes 75 1.4 Abstract Data Types, Interfaces, and Pre- and Postconditions 98 1.5 Requirements Analysis, Use Cases, and Sequence Diagrams 102 1.6 Design of an Array-Based Phone Directory 108 1.7 Implementing and Testing the Array-Based Phone Directory 114 1.8 Completing the Phone Directory Application 121 Chapter Review, Exercises, and Programming Projects 125 Chapter 2 Program Correctness and Efficiency 129 2.1 Program Defects and “Bugs” 130 2.2 Exceptions 138 2.3 Testing Programs 148 2.4 Debugging a Program 160 2.5 Reasoning about Programs: Assertions and Loop Invariants 166 2.6 Efficiency of Algorithms 170 Chapter Review, Exercises, and Programming Projects 179 Chapter 3 Inheritance and Class Hierarchies 185 3.1 Introduction to Inheritance and Class Hierarchies 186 3.2 Member Function Overriding, Member Function Overloading, and Polymorphism 193 3.3 Abstract Classes, Assignment, and Casting in a Hierarchy 202 3.4 Multiple Inheritance 210 3.5 Namespaces and Visibility 213 3.6 A Shape Class Hierarchy 220 Chapter Review, Exercises, and Programming Projects 225 Chapter 4 Sequential Containers 231 4.1 Template Classes and the Vector 232 4.2 Applications of vector 238 4.3 Implementation of a vector Class 240 4.4 The Copy Constructor, Assignment Operator, and Destructor 247 4.5 Single-Linked Lists and Double-Linked Lists 252 4.6 The list Class and the Iterator 264 4.7 Implementation of a Double-Linked List Class 271 4.8 Application of the list Class 285 4.9 Standard Library Containers 292 4.10 Standard Library Algorithms and Function Objects 297 Chapter Review, Exercises, and Programming Projects 307 Chapter 5 Stacks 311 5.1 The Stack Abstract Data Type 312 5.2 Stack Applications 315 5.3 Implementing a Stack 325 5.4 Additional Stack Applications 332 Chapter Review, Exercises, and Programming Projects 351 Chapter 6 Queues and Deques 357 6.1 The Queue Abstract Data Type 358 6.2 Maintaining a Queue of Customers 362 6.3 Implementing the Queue ADT 365 6.4 The Deque 376 6.5 Simulating Waiting Lines Using Queues 380 Chapter Review, Exercises, and Programming Projects 398 Chapter 7 Recursion 403 7.1 Recursive Thinking 404 7.2 Recursive Definitions of Mathematical Formulas 412 7.3 Recursive Search 420 7.4 Problem Solving with Recursion 426 7.5 Backtracking 435 Chapter Review, Exercises, and Programming Projects 440 Chapter 8 Trees 445 8.1 Tree Terminology and Applications 447 8.2 Tree Traversals 454 8.3 Implementing a Binary_Tree Class 457 8.4 Binary Search Trees 466 8.5 Heaps and Priority Queues 484 8.6 Huffman Trees 496 Chapter Review, Exercises, and Programming Projects 505 Chapter 9 Sets and Maps 511 9.1 Associative Container Requirements 512 9.2 Maps and Multimaps 521 9.3 Hash Tables 530 9.4 Implementing the Hash Table 542 9.5 Implementation Considerations for the hash_map 555 9.6 Additional Applications of Maps 558 Chapter Review, Exercises, and Programming Projects 564 Chapter 10 Sorting 569 10.1 Using C++ Sorting Functions 570 10.2 Selection Sort 572 10.3 Bubble Sort 577 10.4 Insertion Sort 581 10.5 Comparison of Quadratic Sorts 586 10.6 Shell Sort: A Better Insertion Sort 588 10.7 Merge Sort 592 10.8 Heapsort 599 10.9 Quicksort 604 10.10 Testing the Sort Algorithms 614 10.11 The Dutch National Flag Problem (Optional Topic) 616 Chapter Review, Exercises, and Programming Projects 620 Chapter 11 Self-Balancing Search Trees 623 11.1 Tree Balance and Rotation 624 11.2 AVL Trees 628 11.3 Red-Black Trees 643 11.4 2-3 Trees 656 11.5 2-3-4 and B-Trees 663 Chapter Review, Exercises, and Programming Projects 681 Chapter 12 Graphs 691 12.1 Graph Terminology 692 12.2 The Graph ADT and Edge Class 697 12.3 Implementing the Graph ADT 701 12.4 Traversals of Graphs 715 12.5 Applications of Graph Traversals 727 12.6 Algorithms Using Weighted Graphs 734 Chapter Review, Exercises, and Programming Projects 743 Appendix A Advanced C++ Topics 755 A.1 Source Character Set, Trigraphs, Digraphs, and Alternate Keywords 755 A.2 The Allocator 756 A.3 Traits 757 A.4 Virtual Base Classes 759 A.5 Smart Pointers 764 Appendix B Overview of UML 769 B.1 The Class Diagram 770 B.2 Sequence Diagrams 776 Appendix C The CppUnit Test Framework 779 Glossary 783 Index 795
£168.26
John Wiley & Sons Inc Programming the Network with Perl
Book SynopsisPresents skills network professionals need, including the ability to analyze network traffic that programs generate, efficient interaction with standard network protocols, and management of complex network systems.Trade Review"Clear writing and useful examples characterise this book". (www.linuxjournal.com, 21 May 2002)Table of Contents1. Meet Perl Perl's Default Behaviour Using Variables in Perl Controlling Flow Boolean in Perl Perl Operators Subroutines Perl I/O Packages, Modules and Objects More Perl Where to From Here? Print Resources Web Resources 2. Snooping Thank You, Tim Potter Preparing to Snoop Building Low-Level Snooping Tools Snooping IP Datagrams Transport Snoopers The Network Debugger Where to From Here? Print Resources Web Resources 3. Sockets Clients and Servers Transport Services Introducing the Perl Socket API Socket Support Subroutines Simple UDP Clients and Servers Genericity and Robustness UDP is Unreliable Sending and Receiving with UDP Dealing with Deadlock TCP Clients and Servers A Common TCP Gotcha More TCP Socket Communication The Concurrent Syntax Checker Object-Oriented Sockets Where to From Here? Print Resources Web Resources 4. Protocols Gotcha! Working with the Web The World's Worst Web Browser HTTP Status Codes It's the Gisle and Graham Show! The Library for WWW Access in Perl The LWPwwwb Program Doing More with LWPwwwb Building a Custom Web Server The libnet Library Email Enabling simplehttpd Other Networking Add-on Modules Where to From Here? Print Resources Web Resources 5. Management Simple Management with ICMP Doing the Ping Thing Doing the Net: Ping Thing Tracing Routes Not So Simple Management with SNMP The SNMP Management Framework Managed Data The SNMP Protocol The Net: SNMP Module Working with Net: SNMP What's Up? Setting MIB-II Data IP Router Mapping Where to From Here? Print Resources Web Resources 6. Mobile Agents What is a Mobile Agent? Mobile-Agent Examples Mobile-Agent Advantages/Disavantages Perl Agents The Agent.pm Module Ooooh, Objects! The Default Mobile Agent A Launching Mobile-Agent Environment A One-Shot Location Relocating to Multiple Locations The Mobile-Agent multiwho The Mobile-Agent ipdetermine The Cloning Mobile-Agent ipdetermine Other Perl Agent Examples Where to From Here? Print Resources Web Resources Appendices Index
£26.25
John Wiley & Sons Inc LispStat
Book SynopsisWritten for the professional statistician or graduate statistics student, the primary objective of this book is to describe a system, based on the LISP language, for statistical computing and dynamic graphics to show how it can be used as an effective platform for a wide range of statistical computing tasks ranging from basic calculations to customizing dynamic graphs. In addition, it introduces object-oriented programming and graphics programming in a statistical context. The discussion of these ideas is based on the Lisp-Stat system; readers with access to such a system can reproduce the examples presented and use them as a basis for further experimentation and study.Table of ContentsA Lisp-Stat Tutorial. Programming in Lisp. Additional Lisp Features. Statistical Functions. Object-Oriented Programming. Windows, Menus, and Dialogs. Graphics Windows. Statistical Graphics Windows. Some Dynamic Graphics Examples. Bibliography. Answers to Selected Exercises. The XLISP-STAT Implementation. Index.
£159.26
John Wiley & Sons Inc Writing Scientific Programs Under the OS2
Book SynopsisProvided here is a simple introduction to writing scientific programs using the OS/2 presentation manager. This book shows you how to write programs in the C language and is the first to illustrate how to plot data on hard copy devices such as dot matrix printers and pen plotters. Since the C language may be somewhat hard to read for some beginners, a chapter has been included which introduces the C language and includes simple definitions to make C more readable. Discussions comprehensively cover all important areas, including: how to display images such as those obtained from scanning microscopy techniques, frame grabbers, and image capture devices; how multiple thread of execution can be used within your program so that several tasks can run at the same time; the methods of communicating between these threads; how to acquire data from acquisition cards; an introduction to the Intel 80286 assembly language; and how to make calls to OS/2''s serial device driver showing how to send andTable of ContentsProtected Mode Programs. A Brief Introduction to the C Language. Memory Management under OS/2. Writing a Simple Multithread Program. Using the Presentation Manager. Adding Menu Commands to Your Program. The Keyboard in OS/2 PM. Using Dialog Boxes with the Presentation Manager. Using the Help System in OS/2 PM. Using the Graphics Presentation Interface. Child Windows. Using the Mouse in OS/2 Programs. Building a Dynamic Link Library. Printing Graphics and Text under OS/2. Communicating through Serial Ports. Using List Boxes to Get Filenames. Graphics Metafiles and Segments. Images and Bitmaps. Multitasking in OS/2. Communicating between OS/2 Processes and Threads. Elements of Assembly Language Programming. Sending I/O Commands to Devices. Writing Device Drivers. Writing a Device Driver in C. Index.
£198.86
John Wiley & Sons Inc Stiquito Controlled Robot Kit
Book SynopsisTable of ContentsForeword vii Preface ix 1 An Introduction to Robotics and Stiquito 1 2 Introduction to Embedded Systems and the Stiquito Controller Board 15 3 PCB Layout and Manufacturing 33 4 Building Stiquito Controlled 63 5 Stiquito Programming Using Texas Instruments MSP430F1122 111 6 A Two-Degree-of-Freedom Stiquito Robot 129 7 Optimizing the Stiquito Robot for Speed 147 8 More Stiquito Controlled 159 Appendix: Sources of Materials for Stiquito 169 Glossary 175 Index 183 About the Authors 187
£31.82
John Wiley & Sons Inc Web Application Design and Implementation
Book SynopsisWeb Application Design and Implementation uses a hands-on approach of the major technologies and programming languages to teach readers web development. Providing an understanding of all major aspects of web programming in order to achieve the construction of a database-driven website, the book features state-of-the-art programming languages such as HTML, JavaScript, MySQL, PHP, Apache, Linux/Unix.Trade Review"It explains all concepts at a very elementary level, and allows the novice reader (with basic knowledge of programming) to learn fundamental concepts of Web programming and practical Web design. For an experienced reader, it will provide very good overview of Web programming practices form one particular perspective, that of using open-source software tools." (Computing Reviews, November 25, 2008)Table of ContentsPREFACE. About the Author. Before We Get Started. Who Should Read this book? About The Examples. How to read this book. Acknowledgments. Introduction: Web Application Recipe. Overview. Step 1 - Understanding the problem and finding the solution. Step 2 - Designing the database. Step 3 - Major functionalities. Step 4 - Back side. Step 5 - Improvements on functionality. Step 6 - Improvements on looks. Step 7 - Thorough testing, hacking attempts. Step 8 - Presentation. Step 9 - Publication. Step 10 - Celebration (and maintenance). Chapter 1. Fundamentals. The origins of the Internet. The World Wide Web. The Web Browsers. The Web Servers. TCP/IP BASICS. The Internet Layer. The Transport Layer. The Application Layer. The Toolbox. Browsers. FTP. E-Mail Clients. Programming Tools. Other Useful Tools. Chapter 2. The Different Approaches of Web Programming. Before We Get Started. The Basics - HTML. The Creator - SGML. Other SGML-based languages - XML / XSL. The good old Java. Something different - JavaScript. The Savior - PHP. The rival - ASP.NET. The Myth - CGI. Another Big Option - Perl. The Future? - C#. Client-side versus Server-side - Which side to pick? My Choices - PHP, MySQL, JavaScript. Chapter 3. Introduction To HTML. What do you need to get started? How does HTML work? Syntax basics. File Structure. Tags Parameters. Basic Text Formatting. External References. Links. Images. Organizing Data. Lists. Tables. Frames. Special Characters. Chapter 4. Work Environment. Introduction. Downloading the Software. Installing the Apache Server. Installation Steps. Checking the Installation. Possible Errors. Configuring Apache. Installing PHP5. Testing PHP. Installing MySQL. Adding a MySQL user. How do I know if MySQL is running? Installing phpMyAdmin. Installing a Bulletin Board: phpBB. Installation Steps. Basic Security things to consider! Conclusion. Chapter 5. PHP - A server Side Scripting Language. How does it work? Some “new” words on PHP. Syntax Generalities. Instructions. Operators. Mathematical Functions. Data Types. Constants. Variables. Chapter 6. PHP Arrays and Flow of Control. Arrays. Basic Arrays. Associative Arrays. Multidimensional Arrays. Arrays Functions. PHP Program Structure and Flow of control. Conditions. Loops. Functions. Chapter 7. Using files, folders and Strings in PHP. Using Files. Folder Manipulation. Basic String Manipulation. Changing a string. Finding and Comparing. Formatting Strings. Manipulating HTML files. PHP Information Functions. Closing Remarks. Writing a basic File Explorer. Requirements. HINTS. Case Study: An Indexer/Searcher STEP 1. Overview. The Indexer - Step 1. Chapter 8. PHP5 and Object-Oriented Programming. Overview. Classes and Objects. Classes in PHP. Constructors and Destructors. Visibility. The scope resolution operator. The Static Keyword. Class Constants. Class Abstraction. Object Interfaces. Copying and Cloning objects. Comparing Objects. Type Hinting. Exceptions. Final words. Chapter 9. Creating Some Interactivity. Overview. Forms. Writing a form in HTML. GET vs. POST. Retrieving the form info on a PHP script. Dynamically creating forms. Transferring data between PHP scripts. Cookies. Sessions. One last useful function and design techniques. Assignments. File explorer step 2. Case study: Indexer/Searcher - Step 2. Chapter 10: Making Cleaner Code and Output. Cleaning up your code. What you need. How to use it? - HTML side. How to use it? - PHP side. Cleaning up your output. The CSS file. Useful tools. Assignment. Chapter 11. Using Databases. Overview. Database Basics. The entity-relationship model. More Practical Example. Typical sources of Errors. Simplifying the Diagrams. Using MySQL. MySQL Syntax. Data Types. MySQL numeric data types. Date and Time data types. String Data types. MySQL Operators. MySQL Instructions. Using Functions in MySQL. Chapter 12. Using PhpMyAdmin. Overview. Creating a Database. Creating tables. Accessing an existing table. Exporting/Importing a database structure and content. Assignment - Final Project. Chapter 13. Creating Database-Driven Websites with PHP/MySQL. Overview. Connecting to your MySQL server with PHP. Submitting SQL queries. Processing the results of a query. Example of login procedure. Other useful functions. Grouping our Methods in a class. Indexer/Searcher - Steps 3 and 4. Chapter 14: JavaScript - A client side scripting language. Introduction. JavaScript syntax. Types of Data and Variables. Operations and calculations. Arrays. Decisions. Loops. Using Functions. Using Objects. The String Objects. The Math class. The Array objects. Chapter 15. Programming the Browser. Overview. The Window Object. The Location Object. The History Object. The Navigator Object. The Screen Object. The Document Object. Using Events. Timers. Time to practice! Chapter 16. Windows and Frames. Frames and JavaScript. Windows and JavaScript. Assignments. One Last Funny Example. Chapter 17: String Manipulations Revisited. Overview. New Basic String methods. Regular Expressions in JavaScript. Regular Expressions in PHP. The set of PCRE. Chapter 18. JavaScript and DHTML. Overview. Positioning Elements. Writing dynamic menus in DHTML. You turn!! . Chapter 19. Putting it All Together! Overview. Step 1 - Understanding the problem and finding the solution. Step 2 - Designing the database. Step 3 - Main functionalities. Step 4 - Back side. Step 5 - Improvements on functionality. Step 6 - Improvements on looks. Step 7 - Thorough testing, hacking attempts. Step 8 - Presentation. Step 9 - Publication. Step 10 - Celebration :) (and maintenance). What language to use? Appendix A: Special Characters. Appendix B: Installing on UNIX. Overview. Installing Apache and PHP. Installing MySQL. Appendix C: Advanced phpBB. Appendix D: class.FastTemplate.PHP. Appendix E - File Upload Script. Bibliography. Index.
£86.36
John Wiley & Sons Inc Programming the Boundary Element Method
Book SynopsisProviding an easy introduction to the boundary element method, this book is ideal for any reader wishing to work in this field or use this method for the solution of engineering problems. From the beginning, the emphasis is on the implementation of the method into computer programs which can be used to solve real problems. The book covers two-andthree-dimensional linear and non-linear analysis in potential flow (heat flow and seepage) and static elasticity. Several computer programs are listed in the book and may be downloaded free of charge via the Internet. They include programs and subroutines for: * 2-D analysis of potential problems using the Trefftz method * 2-D and 3-D linear analysis of potential and static elasticity problems using isoparametric elements (single and multiple regions) * implementation of non-linear problems * coupling to finite elements The programs (written in FORTRAN 90) are well documented, and can be employed by the user to gaiTable of ContentsPreface. Acknowledgements. Preliminaries. Programming. Discretisation and Interpolation. Material Modelling and Fundamental Solutions. Boundary Integral Equations. Boundary Element Methods - Numerical Implementation. Assembly and Solution. Postprocessing. Test Examples. Multiple Regions. Edges and Corners. Body Forces. Non-Linear Problems. Coupled Boundary Element/Finite Element Analysis. Industrial Applications. Appendix A: Program Libraries. Appendix B: Answers to Exercises. Index.
£56.66
John Wiley & Sons Inc Lingo Sorcery 2e The Magic of Lists Objects and
Book SynopsisThis text explains how to apply Object-Oriented Programming techniques to multimedia products made with Director, this edition incorporates the many significant changes made to the program since the first edition was published.Trade Review"...Plenty of good advice is dispensed on techniques for using objects and lists to best effect. At this price the book is value for money...", , , Computer Bulletin, November 1999 #Table of ContentsMaking an Independent Object. Adding Sophisticated Features to Objects. Getting Object-Oriented. Messages, Control and Feedback. The Ancestor Portal. The Basis of Complex Objects. The Mechanics of Linear Lists. The Mechanics of Property Lists. Using Lists. Messages and Message Paths. Using Lists in Message Paths. The Object-User Interface. Object-Controlled Menus. Magical Tricks with Lists and Objects. Making a Paint Box with a Memory. Intelligent Button and Palette Objects. The Magic of MIAW Objects. Using MIAW Objects. Behaviors. Intranets, Kiosks and Avatars. Epilog. Index.
£53.06
Cambridge University Press Numerical Methods in Finance with C
Book SynopsisThis book focuses on solving and implementing the increasingly complex numerical problems that arise in finance. Readers will learn the numerical techniques and programming skills necessary for any aspiring quant developer. No programming background is required, making the book thoroughly suitable for beginners.Trade Review"This book leads the reader directly into the heart of C++ programming technique without too much fuss. And in so doing, the reader also learns some very important and fundamental methods in options pricing. I highly recommend this little gem of a book." Professor Michael K. Ong, IIT Stuart School of Business"I find the monograph to be an excellent integration of the object-oriented concepts of C++ and the classical numerical techniques used in quantitative finance. Throughout the book, there is an introduction to the numerical technique to be used, along with the need for such a method from the prospective of financial mathematics. After this discussion, the C++ source code that implements the technique is not only given but also annotated to highlight or to clarify reasons for the use of certain object-oriented constructs. As the authors comment, there are some source files which are not listed but are available from the publisher's web site. The monograph is an exceptional book for demonstrating the implementation of the various aspects of C++ in a very concrete fashion. There is substance given to C++ concepts that are introduced in basic programming courses but seldom framed in a realistic setting. The reader, however, should have some familiarity with C++ and mathematical finance, prior to reading the monograph. The book is not intended to be an introduction to either object-oriented C++ or mathematical finance. With such a background, the style and the content of the book make for an informative experience." Professor Sherman Wong, City University of New YorkTable of ContentsPreface; 1. Binomial pricer; 2. Binomial pricer revisited; 3. American options; 4. Nonlinear solvers; 5. Monte Carlo methods; 6. Finite difference methods; Index.
£35.14
Cambridge University Press Illustrating BBC Basic
Book SynopsisThis book may be used as a self-contained manual for BBC-BASIC, the main language of the BBC Microcomputer and Master Series Computers. Information is presented in a form handy for reference. Page 163, for example, tabulates all characters in the ASCII range; pages 124-5 summarize all information needed when composing screens of MODE 7 graphics. A quick reference to all functions and operators is given on page 179; the syntax of every statement and command of BBC-Basic is summarized on pages 180-1. But there is more to this book. How do you make a computer sort names into alphabetical order? Not as obvious as it might seem. Three different sorting techniques are explained by example in this book: bubble sort, monkey puzzle (more formally the 'binary tree') and Quicksort relies on 'recursion' - an important programming concept which is explained and demonstrated. Making coloured objects rebound around the walls of a squash court is another technique demonstrated; so is making voices sinTable of ContentsPreface; 1. Introductory example; 2. Rudiments; 3. Notation; 4. Arithmetic; 5. Strings; 6. Control; 7. Arrays; 8. Functions and procedures; 9. Input and output; 10. Graphics; 11. Sound; 12. Files; 13. Operation and error handling; 14. Backdoor basic; Quick reference; Index.
£41.99
Cambridge University Press Term Rewriting Systems 55 Cambridge Tracts in Theoretical Computer Science Series Number 55
Book SynopsisA comprehensive 2003 treatment of term rewriting systems from an elementary to an advanced level. Much of this material appeared here for the first time in book form. Ideal for teaching or research, it features numerous exercises with selected solutions on the web, an extensive bibliography and a chapter on applications.Trade Review'The book presents the state of the art of rewriting techniques, it gives (or scratches) proofs on a very precise level and gives hints to historical sources of the results and to further readings, so it is highly recommended to researchers working in this area.' Zentralblatt für Mathematik'… has extensive material … suffice it to say that this book is indispensable for a any serious student of rewriting.' Journal of TLP'… it will soon be a compulsory reference for anyone working in the area.' Journal of Functional ProgrammingTable of Contents1. Abstract reduction systems; 2. First-order term rewriting systems; 3. Examples of TRSs and special rewriting formats; 4. Orthogonality; 5. Properties of rewriting: decidability and modularity; 6. Termination; 7. Completion of equational specifications; 8. Equivalence of reductions; 9. Strategies; 10. Lambda calculus; 11. Higher order rewriting; 12. Infinitary rewriting; 13. Term graph rewriting; 14. Advanced ARS theory; 15. Rewriting based languages and systems; 16. Mathematical background.
£185.25
Cambridge University Press Theories of Programming Languages
Book SynopsisFirst published in 1998, this textbook is a broad but rigourous survey of the theoretical basis for the design, definition and implementation of programming languages and of systems for specifying and proving program behaviour.Trade Review"I found the whole book a distinct pleasure to read and certainly recommend this text for consideration by instructors." Mathematical Reviews"clearly structured...the presentation is clear, and the typesetting often helps the reader to understand the structure of the formulas. Each chapter contains valuable exercises and profound bibliographic notes that can serve as a starting point for further reading. I shall use this excellent textbook in my lectures." Computing Reviews"...an important book...It is thorough and well organized, and the explanations are very clear. I found the technical content to be in almost every respect flawless. Although written to be a student text, I believe that most researchers (and many practitioners) in programming lanauges (and related fields) would find it worth reading." Journal of Functional ProgrammingTable of ContentsPreface; 1. Predicate Logic; 2. The Simple Imperative Language; 3. Programme Specifications and their Proofs; 4. Arrays; 5. Failure, Input-Output and Continuations; 6. Transition Semantics; 7. Nondeterminism and Guarded Commands; 8. Shared-variable Concurrency; 9. Communicating Sequential Processes; 10. The Lambda Calculus; 11. An Eager Functional Language; 12. Continuations in a Functional Language; 13. Iswim-like Languages; 14. A Normal-order Language; 15. The Simple Type System; 16. Subtypes and Intersection Types; 17. Polymorphism; 18. Module Specification; 19. Algol-like Languages; Appendices; Bibliography; Index.
£67.00
Cambridge University Press Modern Compiler Implementation in C
Book SynopsisDescribes all phases of a modern compiler, including techniques in code generation and register allocation for imperative, functional and object-oriented languages.Table of ContentsPart I. Fundamentals of Compilation: 1. Introduction; 2. Lexical analysis; 3. Parsing; 4. Abstract syntax; 5. Semantic analysis; 6. Activation records; 7. Translation to intermediate code; 8. Basic blocks and traces; 9. Instruction selection; 10. Liveness analysis; 11. Register allocation; 12. Putting it all together; Part II. Advanced Topics: 13. Garbage collection; 14. Object-oriented languages; 15. Functional programming languages; 16. Polymorphic types; 17. Dataflow analysis; 18. Loop optimizations; 19. Static single-assignment form; 20. Pipelining and scheduling; 21. The memory hierarchy; Appendix.
£64.99
Cambridge University Press The Optimal Implementation of Functional Programming Languages 45 Cambridge Tracts in Theoretical Computer Science Series Number 45
Book SynopsisThis book, the first in the subject, is a comprehensive account of optimal reduction by two of its leading exponents. Practical implementation aspects are fully covered as are its mathematical underpinnings. The book is essentially self-contained, requiring no more than basic familiarity with functional languages. It will be welcomed by graduate students and research workers.Table of Contents1. Introduction; 2. Optimal reduction; 3. The full algorithm; 4. Optimal reductions and linear logic; 5. Zig-zag; 6. Paths; 7. Read-back; 8. Other translations in sharing graphs; 9. Safe nodes; 10. Complexity; 11. Functional programming; 12. Source language; Bibliography; Index.
£76.99
Cambridge University Press Computational Geometry in C Second Edition
Book SynopsisThis is the revised and expanded 1998 edition of a popular introduction to the design and implementation of geometry algorithms arising in areas such as computer graphics, robotics, and engineering design. The basic techniques used in computational geometry are all covered: polygon triangulations, convex hulls, Voronoi diagrams, arrangements, geometric searching, and motion planning. The self-contained treatment presumes only an elementary knowledge of mathematics, but reaches topics on the frontier of current research, making it a useful reference for practitioners at all levels. The second edition contains material on several new topics, such as randomized algorithms for polygon triangulation, planar point location, 3D convex hull construction, intersection algorithms for ray-segment and ray-triangle, and point-in-polyhedron. The code in this edition is significantly improved from the first edition (more efficient and more robust), and four new routines are included. Java versions foTrade Review'… the author does an excellent job of explaining difficult concepts in an accessible, even entertaining, manner … If this is your field, this is your book!' Developers Review'The balanced combination of careful descriptions, examples, algorithms and exercises makes it a pleasure to read …'. Zentralblatt'Anyone who wants to know what this field is all about should read this book! The book is a pleasure to read, as questions that arise naturally in the reader's mind are answered, in almost all cases, in the following paragraph. The style strikes an ideal balance between rigor and informality. Mr O'Rourke must be a wonderful teacher and I envy his students.' Miriam L. Lucian, Society for Industrial and Applied MathematicsTable of Contents1. Polygon triangulation; 2. Polygon partitioning; 3. Convex hulls in two dimensions; 4. Convex hulls in three dimensions; 5. Voronoi diagrams; 6. Arrangements; 7. Search and intersection; 8. Motion planning; 9. Sources.
£47.99
Penguin Young Readers Técnicas para el manejo de la ira Guía para niños
Book Synopsis
£12.71
£18.63
iUniverse BACK TO EDEN
£8.01
£10.91
iUniverse Jamaican Cooking Made Easy Volume I 1
£17.68
O'Reilly Media Java Servlet Programming
Book SynopsisThis new edition of this book has been updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. It also introduces several popular tools including JavaServer Pages (JSP), Tea, XMLC, and the Element Construction Set.Table of Contents1. Introduction History of Web Applications Support for Servlets The Power of Servlets. 2. HTTP Servlet Basics HTTP Basics The Servlet API Page Generation Web Applications Moving On. 3. The Servlet Lifecycle The Servlet Alternative Servlet Reloading Init and Destroy Single-Thread Model Background Processing Load on Startup Client-Side Caching Server-Side Caching. 4. Retrieving Information The Servlet The Server The Client. 5. Sending HTML Information The Structure of a Response Sending a Normal Response Using Persistent Connections Response Buffering Status Codes HTTP Headers When Things Go Wrong Six Ways to Skin a Servlet Cat. 6. Sending Multimedia Content WAP and WML Images Compressed Content Server Push. 7. Session Tracking User Authentication Hidden Form Fields URL Rewriting Persistent Cookies The Session Tracking API. 8. Security HTTP Authentication Form-Based Authentication Custom Authentication Digital Certificates Secure Sockets Layer (SSL). 9. Database Connectivity Relational Databases The JDBC API Reusing Database Objects Transactions A Guestbook Servlet Advanced JDBC Techniques Beyond the Core. 10. Applet-Servlet Communication Communication Options Daytime Server Chat Server. 11. Servlet Collaboration Sharing Information Sharing Control. 12. Enterprise Servlets and J2EE Distributing Load Integrating with J2EE. 13. Internationalization Western European Languages Conforming to Local Customs Non-Western European Languages Multiple Languages Dynamic Language Negotiation HTML Forms. 14. The Tea Framework The Tea Language Getting Started Request Information Tea Administration Tea Applications A Tool Application Final Words. 15. WebMacro The WebMacro Framework Installing WebMacro WebMacro Directives WebMacro Templates A Tool Application Filters. 16. Element Construction Set Page Components as Objects Displaying a Result Set. 17. XMLC A Simple XML Compile The Manipulation Class A Tool Application. 18. JavaServer Pages Using JavaServer Pages Behind the Scenes Expressions and Declarations Directives JSP and JavaBeans Includes and Forwards A Tool Application Custom Tag Libraries. 19. Odds and Ends Parsing Parameters Sending Email Using Regular Expressions Executing Programs Using Native Methods Acting as an RMI Client Debugging Performance Tuning. 20. What's New in the Servlet 2.3 API Changes in the Servlet API 2.3 Conclusion. A. Servlet API Quick Reference. B. HTTP Servlet API Quick Reference. C. Deployment Descriptor DTD Reference. D. HTTP Status Codes. E. Character Entities. F. Charsets. Index
£29.99
O'Reilly Media Perl LWP
Book SynopsisThis text covers topics including: understanding LWP and its design; fetching and analyzing URLs; extracting information from HTML using regular expressions and tokens; working with the structure of HTML documents using trees; and setting and inspecting HTTP headers and response codes.Table of ContentsForeword Preface 1. Introduction to Web Automation The Web as Data Source History of LWP Installing LWP Words of Caution LWP in Action 2. Web Basics URLs An HTTP Transaction LWP::Simple Fetching Documents Without LWP::Simple Example: AltaVista HTTP POST Example: Babelfish 3. The LWP Class Model The Basic Classes Programming with LWP Classes Inside the do_GET and do_POST Functions User Agents HTTP::Response Objects LWP Classes: Behind the Scenes 4. URLs Parsing URLs Relative URLs Converting Absolute URLs to Relative Converting Relative URLs to Absolute 5. Forms Elements of an HTML Form LWP and GET Requests Automating Form Analysis Idiosyncrasies of HTML Forms POST Example: License Plates POST Example: ABEBooks.com File Uploads Limits on Forms 6. Simple HTML Processing with Regular Expressions Automating Data Extraction Regular Expression Techniques Troubleshooting When Regular Expressions Aren't Enough Example: Extracting Links from a Bookmark File Example: Extracting Links from Arbitrary HTML Example: Extracting Temperatures from Weather Underground 7. HTML Processing with Tokens HTML as Tokens Basic HTML::TokeParser Use Individual Tokens Token Sequences More HTML::TokeParser Methods Using Extracted Text 8. Tokenizing Walkthrough The Problem Getting the Data Inspecting the HTML First Code Narrowing In Rewrite for Features Alternatives 9. HTML Processing with Trees Introduction to Trees HTML::TreeBuilder Processing Example: BBC News Example: Fresh Air 10. Modifying HTML with Trees Changing Attributes Deleting Images Detaching and Reattaching Attaching in Another Tree Creating New Elements 11. Cookies, Authentication, and Advanced Requests Cookies Adding Extra Request Header Lines Authentication An HTTP Authentication Example: The Unicode Mailing Archive 12. Spiders Types of Web-Querying Programs A User Agent for Robots Example: A Link-Checking Spider Ideas for Further Expansion A. LWP Modules B. HTTP Status Codes C. Common MIME Types D. Language Tags E. Common Content Encodings F. ASCII Table G. User's View of Object-Oriented Modules Index
£23.99
O'Reilly Media Programming Web Services with Perl
Book SynopsisThe book concentrates on what is useful and practical. It introduces the major Web services standards, such as XML-RPC, SOAP, WSDL, and UDDI, and shows how to implement Perl servers and clients using these standards.Trade Review"Although the book is aimed at Perl programmers interested in Web Serices, some of the protocols are described clearly enough that the book may also be useful for programmers in other languages, such as PHP or C/C++. If you are such a Perl programmer then this book is "Highly Recommended", indeed, almost essential." - Tim Pushman, CVu, JuneTable of ContentsPreface 1. Introduction to Web Services History The Web Services Dream The Web Services Cold Shower Who to Believe? Web Services in the Real World 2. HTTP and XML Basics HTTP XML XML Schema 3. Introduction to XML-RPC History of XML-RPC Example Client: Meerkat Limitations of XML-RPC 4. Programming XML-RPC Perl Toolkits for XML-RPC RPC::XMLSimple XMLRPC::Lite RPC::XML 5. Introduction to SOAP Background XML Definitions RPC over SOAP SOAP Transport Further Reading 6. Programming SOAP A Toolkit Approach DevelopMentor's SOAP Module The SOAP::Lite Module Other SOAP-Related Modules 7. Serving SOAP over HTTP Basic SOAP::Lite Servers The Application Designing the Server Tying the Interface Code to SOAP Improving the Code and the Service Ideas for Further Exploration 8. SOAP Services Without HTTP Choosing a Protocol Authentication Transports with Server and Client Standalone Protocols Creating New Transport Modules 9. Service Description with WSDL Basic WSDL WSDL Programming 10. Service Advertising and Discovery with UDDI Defining UDDI Programming with UDDI::Lite 11. REST: Representational State Transfer Defining REST REST Principles Programming REST 12. Advanced Web Services Topics Message Routing Packaging Security Services Discovery Reliable Messaging Business Process Management Implementation Considerations WS-Next A. XML-RPC Toolkit Programming Reference B. SOAP::Lite Programming Reference C. XML-RPC Example Code D. SOAP Example Code E. WSDL and UDDI Examples F. Bibliography and References Index
£29.99
O'Reilly Media Ruby in a Nutshell
Book SynopsisWritten by Yukihiro Matsumoto ("Matz"), creator of the language, this text is a practical reference guide covering everything from Ruby syntax to the specifications of its standard class libraries. The book is based on Ruby 1.6, and is applicable to development versions 1.7.Table of ContentsPreface Chapter 1. Introduction Ruby's Elegance Ruby in Action Chapter 2. Language Basics Command-Line Options Environment Variables Lexical Conventions Literals Variables Operators Methods Control Structures Object-Oriented Programming Security Chapter 3. Built-in Library Reference Predefined Variables Predefined Global Constants Built-in Functions Built-in Library Chapter 4. Standard Library Reference Standard Library Chapter 5. Ruby Tools Standard Tools Additional Tools Ruby Application Archive Chapter 6. Ruby Updates Summary of Changes The Future of Ruby Participate in Ruby Index
£15.99
O'Reilly Media Perl in a Nutshell 2e
Book SynopsisThis complete guide to the Perl programming language ranges widely through the Perl programmer's universe, gathering together information about Perl itself and its application to CGI scripts, XML processing, network programming, database interaction, and graphical user interfaces.Trade Review"What can I say? This is a nutshell book, and thus the quality is excellent. Being a regular user of the 1st edition of Perl in a Nutshell (does that say more about the book or my perl programming I wonder ...) I fully expected this to be as good if not better. I was not disappointed. " Northampton Linux User groupTable of ContentsPreface I. Getting Started 1. Introduction to Perl What's Perl Good For? Perl Development Which Platforms Support Perl? Perl Resources 2. Installing Perl The CPAN Architecture How Is CPAN Organized? Installing Perl Getting and Installing Modules Documentation II. Language Basics 3. The Perl Executable Command Processing Command-Line Options Environment Variables The Perl Compiler Threads 4. The Perl Language Program tructure Data Types and Variables Statements Special Variables Operators Regular Expressions Subroutines References and Complex Data Structures Filehandles Signals Unicode Formats Pod 5. Function Reference Perl Functions by Category Perl Functions in Alphabetical Order 6. Debugging The Perl Debugger Debugger Commands Using the Debugger Customizing the Debugger The Perl Profiler The perlbug Program III. Modules 7. Packages, Modules, and Objects Namespaces and Packages Modules Object-Oriented Perl Object Syntax 8. Standard Modules AnyDBM_File Attribute::Handlers attributes attrs AutoLoader AutoSplit autouse B B::Asmdata B::Assembler B::Bblock B::Bytecode B::C B::CC B::Concise B::Debug B::Deparse B::Disassembler B::Lint B::Showlex B::Stackobj B::Terse B::Xref base Benchmark bigint bignum bigrat blib bytes ByteLoader Carp CGI CGI::Apache CGI::Carp CGI::Cookie CGI::Fast CGI::Pretty CGI::Push CGI::Switch charnames Class::ISA Class::Struct Config constant CPAN CPAN::FirstTime CPAN::Nox Cwd Data::Dumper DB DB_File Devel::DProf Devel::PPPort Devel::SelfStubber diagnostics Digest Digest::MD5 DirHandle Dumpvalue DynaLoader encoding English Env Errno Exporter ExtUtils::Command ExtUtils::Command::MM ExtUtils::Constant ExtUtils::Embed ExtUtils::Install ExtUtils::Installed ExtUtils::Liblist ExtUtils::MakeMaker ExtUtils::Manifest ExtUtils::Miniperl ExtUtils::Mkbootstrap ExtUtils::Mksymlists ExtUtils::MM ExtUtils::MM_Any ExtUtils::MM_BeOS ExtUtils::MM_DOS ExtUtils::MM_NW5 ExtUtils::MM_OS2 ExtUtils::MM_Unix ExtUtils::MM_UWIN ExtUtils::MM_VMS ExtUtils::MM_Win32 ExtUtils::MY ExtUtils::Packlist ExtUtils::testlib Fatal Fcntl fields File::Basename File::CheckTree File::Compare File::Copy File::DosGlob File::Find File::Path File::Spec File::Spec::Cygwin File::Spec::Mac File::Spec::OS2 File::Spec::Unix File::Spec::VMS File::Spec::Win32 File::stat File::Temp FileCache FileHandle Filter::Simple Filter::Util::Call FindBin GDBM_File Getopt::Long Getopt::Std Hash::Util I18N::Collate I18N::Langinfo I18N::LangTags I18N::LangTags::List if integer IO IO::File IO::Handle IO::Pipe IO::Seekable IO::Select IO::Socket IPC::Msg IPC::Open2 IPC::Open3 IPC::Semaphore IPC::SysV less lib List::Util locale Math::BigFloat Math::BigInt Math::BigInt::Calc Math::BigRat Math::Complex Math::Trig MIME::Base64 MIME::QuotedPrint NDBM_File Net::Cmd Net::Config Net::Domain Net::FTP Net::hostent Net::netent Net::Netrc Net::NNTP Net::Ping Net::POP3 Net::protoent Net::servent Net::SMTP Net::Time O ODBM_File Opcode ops overload PerlIO PerlIO::Scalar PerlIO::Via Pod::Functions Pod::Html Pod::ParseLink Pod::Text POSIX re Safe Scalar::Util SDBM_File Search::Dict SelectSaver SelfLoader Shell sigtrap Socket sort Storable strict subs Switch Symbol sys::Hostname Sys::Syslog Term::Cap Term::Complete Term::ReadLine Test Test::Builder Test::Harness Test::More Test::Simple Text::Abbrev Text::Balanced Text::ParseWords Text::Soundex Text::Tabs Text::Wrap Thread Thread::Queue Thread::Semaphore Thread::Signal Thread::Specific Tie::Array, Tie::StdArray Tie::File Tie::Handle Tie::Hash Tie::Memoize Tie::RefHash Tie::Scalar Tie::SubstrHash Time::gmtime Time::HiRes Time::Local Time::localtime Time::tm UNIVERSAL User::grent User::pwent utf8 vars vmsish XS::Typemap IV. CGI 9. CGI Overview A Typical CGI Interaction URL Encoding Extra Path Information CGI Environment Variables 10. The CGI.pm Module HTML Tag Generation Importing Method Groups Maintaining State Named Parameters Using JavaScript Features Debugging CGI.pm Reference 11. Web Server Programming with mod_perl Design of mod_perl Installing mod_perl mod_perl Handlers Running CGI Scripts with mod_perl Server-Side Includes with mod_perl Sections Apache:: Modules V. Databases 12. Databases and Perl DBM Databases and DBM Hashes Design of DBI DBI Methods DBI Environment Variables VI. XML and SOAP 13. XML and Perl XML Parsing and Validation XML::Parser Methods Expat Handlers XML::Parser Styles Expat Encodings XML::Parser::ContentModel Methods 14. SOAP What Is SOAP? SOAP::Lite SOAP::Data SOAP::Serializer SOAP::Fault VII. Network Programming 15. Sockets Built-in Socket Functions The IO::Socket Module 16. Email Connectivity The Net Modules The Mail Modules 17. Usenet News The NNTP Protocol Net::NNTP The News::Newsrc Module 18. FTP The FTP Protocol Net::FTP FTP Configuration with Net::Netrc 19. Lightweight Directory Access with Net::LDAP How Data Is Stored in LDAP Searching an LDAP Directory with Net::LDAP Adding an Entry to the Directory with Net::LDAP Net::LDAP Methods VIII. LWP 20. The LWP Library LWP Overview The LWP Modules The HTTP Modules The HTML Modules The URI Module IX. Perl/Tk 21. Perl/Tk Widgets Geometry Managers Common Widget Configuration Options The Button Widget The Checkbutton Widget The Radiobutton Widget The Label Widget The Entry Widget The Scrollbar Widget The Listbox Widget The Text Widget The Canvas Widget The Scale Widget The Menubutton Widget The Menu Widget The Optionmenu Widget The Frame Widget The Toplevel Widget X. Win32 22. Win32 Modules and Extensions Win32::Clipboard Win32::Console Win32::ChangeNotify Win32::Eventlog Win32::File in32::FileSecurity Win32::Internet Win32::IPC Win32::Mutex Win32::NetAdmin Win32::NetResource Win32::PerfLib Win32::Pipe Win32::Process Win32::Registry Win32::Semaphore Win32::Service Win32::Shortcut Win32 Extensions 23. OLE Automation Creating Objects Automation Methods and Properties Win32::OLE::Enum Win32::OLE::Variant Win32::OLE::Const 24. ODBC Extension for Win32 ODBC Methods and Properties Index
£26.99
O'Reilly Media C in a Nutshell
Book SynopsisC++ is a powerful, highly flexible, and adaptable programming language that allows software engineers to organize and process information quickly and effectively. This is a complete reference to C++.Table of Contents1. Language Basics Compilation Steps Tokens Comments Character Sets Alternative Tokens Trigraphs 2. Declarations Declarations and Definitions Scope Name Lookup Linkage Type Declarations Object Declarations Namespaces 3. Expressions Lvalues and Rvalues Type Conversions Constant Expressions Expression Evaluation Expression Rules 4. Statements Expression Statements Declarations Compound Statements Selections Loops Control Statements Handling Exceptions 5. Functions Function Declarations Function Definitions Function Overloading Operator Overloading The main Function 6. Classes Class Definitions Data Members Member Functions Inheritance Access Specifiers Friends Nested Types 7. Templates Overview of Templates Template Declarations Function Templates Class Tem plates Specialization Partial Specialization Instantiation Name Lookup Tricks with Templates Compiling Templates 8. Standard Library Overview of the Standard Library C Library Wrappers Wide and Multibyte Characters Traits and Policies Allocators Numerics 9. Input and Output Introduction to I/O Streams Text I/O Binary I/O Stream Buffers Manipulators Errors and Exceptions 10. Containers, Iterators, and Algorithms Containers Iterators Algorithms 11. Preprocessor Reference 12. Language Reference 13. Library Reference A. Compiler Extensions B. Projects.
£23.99
O'Reilly Media Blast
Book SynopsisBLAST (Basic Local Alignment Search Tool), is a software package for rapid searching of nucleotide and protein databases. "BLAST" offers biologists, computational biology students, and bioinformatics professionals a clear understanding of BLAST as well as the science it supports.Table of ContentsForeword Preface Part I. Introduction 1. Hello BLAST What Is BLAST? Using NCBI-BLAST Alternate Output Formats Alternate Alignment Views The Next Step Further Reading Part II. Theory 2. Biological Sequences The Central Dogma of Molecular Biology Evolution Genomes and Genes Biological Sequences and Similarity Further Reading 3. Sequence Alignment Global Alignment: Needleman-Wunsch Local Alignment: Smith-Waterman Dynamic Programming Algorithmic Complexity Global Versus Local Variations Final Thoughts Further Reading 4. Sequence Similarity Introduction to Information Theory Amino Acid Similarity Scoring Matrices Target Frequencies, lambda, and H Sequence Similarity Karlin-Altschul Statistics Sum Statistics and Sum Scores Further Reading Part III. Practice 5. BLAST The Five BLAST Programs The BLAST Algorithm Further Reading 6. Anatomy of a BLAST Report Basic Structure Alignments 7. A BLAST Statistics Tutorial Basic BLAST Statistics Using Statistics to Understand BLAST Results Where Did My Oligo Go? 8. 20 Tips to Improve Your BLAST Searches 8.1 Don't Use the Default Parameters 8.2 Treat BLAST Searches as Scientific Experiments 8.3 Perform Controls, Especially in the Twilight Zone 8.4 View BLAST Reports Graphically 8.5 Use the Karlin-Altschul Equation to Design Experiments 8.6 When Troubleshooting, Read the Footer First 8.7 Know When to Use Complexity Filters 8.8 Mask Repeats in Genomic DNA 8.9 Segment Large Genomic Sequences 8.10 Be Skeptical of Hypothetical Proteins 8.11 Expect Contaminants in EST Databases 8.12 Use Caution When Searching Raw Sequencing Reads 8.13 Look for Stop Codons and Frame-Shifts to find Pseudo-Genes 8.14 Consider Using Ungapped Alignment for BLASTX, TBLASTN, and TBLASTX 8.15 Look for Gaps in Coverage as a Sign of Missed Exons 8.16 Parse BLAST Reports with Bioperl 8.17 Perform Pilot Experiments 8.18 Examine Statistical Outliers 8.19 Use links and topcomboN to Make Sense of Alignment Groups 8.20 How to Lie with BLAST Statistics 9. BLAST Protocols BLASTN Protocols BLASTP Protocols BLASTX Protocols TBLASTN Protocols TBLASTX Protocols Part IV. Industrial-Strength BLAST 10. Installation and Command-Line Tutorial NCBI-BLAST Installation WU-BLAST Installation Command-Line Tutorial Editing Scoring Matrices 11. BLAST Databases FASTA Files BLAST Databases Sequence Databases Sequence Database Management Strategies 12. Hardware and Software Optimizations The Persistence of Memory CPUs and Computer Architecture Compute Clusters Distributed Resource Management Software Tricks Optimized NCBI-BLAST Part V. BLAST Reference 13. NCBI-BLAST Reference Usage Statements Command-Line Syntax blastall Parameters formatdb Parameters fastacmd Parameters megablast Parameters bl2seq Parameters blastpgp Parameters (PSI-BLAST and PHI-BLAST) blastclust Parameters 14. WU-BLAST Reference Usage Statements Command-Line Syntax WU-BLAST Parameters xdformat Parameters xdget Parameters Part VI. Appendixes A. NCBI Display Formats B. Nucleotide Scoring Schemes C. NCBI-BLAST Scoring Schemes D. blast-imager.pl E. blast2table.pl Glossary Index
£29.99
O'Reilly Media Mastering Perl for Bioinformatics
Book SynopsisBioinformatics is a fast-moving field with problems that require non-trivial programming skills. This text takes the reader from beginner level to the doorstep of advanced material by concentrating on Perl modules and specific applications areas of current and future interest.Table of ContentsPart I. Object-Oriented Programming in Perl 1. Modular Programming with Perl What Is a Module? Why Perl Modules? Namespaces Packages Defining Modules Storing Modules Writing Your First Perl Module Using Modules CPAN Modules Exercises 2. Data Structures and String Algorithms Basic Perl Data Types References Matrices Complex Data Structures Printing Complex Data Structures Data Structures in Action Dynamic Programming Approximate String Matching Resources Exercises 3. Object-Oriented Programming in Perl What Is Object-Oriented Programming? Using Perl Classes (Without Writing Them) Objects, Methods, and Classes in Perl Arrow Notation (->) Gene1: An Exam ple of a Perl Class Details of the Gene1 Class Gene2.pm: A Second Example of a Perl Class Gene3.pm: A Third Example of a Perl Class How AUTOLO AD Works Cleaning Up Unused Objects with DESTROY Gene.pm: A Fourth Example of a Perl Class How to Document a Perl Class with POD Additional Topics Resources Exercises 4. Sequence Formats and Inheritance Inheritance FileIO.pm: A Class to Read and Write Files SeqFileIO.pm: Sequence File Formats Resources Exercises 5. A Class for Restriction Enzymes Envisioning an Object Rebase.pm: A Class Module Restriction.pm: Finding Recognition Sites Drawing Restriction Maps Resources Exercises Part II. Perl and Bioinformatics 6. Perl and Relational Databases One Perl, Many Dat abases Popular Relational Databases Relati onal Database Definitions Structured Query Language Administering Your Database Relational D atabase Design Perl DBI and DBD Interface Modules A Rebase Database Implementation Additiona l Topics Resources Exercises 7. Perl and the Web How the Web Works Web Servers and Browsers The Common Gateway Interface Rebase: Building Dynamic Web Pages Exercises 8. Perl and Graphics Computer Graphics GD Adding GD Graphics to Restrictionmap.pm Making Graphs Resources Exercises 9. Introduction to Bioperl The Growth of Bioperl Installing Bioperl Testing Bioperl Bioperl Problems Overview of Objects bptutorial.pl bptutorial.pl: sequence_manipulation Demo Using Bioperl Modules Part III. Appendixes A. Perl Summary B. Installing Perl.
£29.99
O'Reilly Media C Essentials 2e
Book SynopsisThis volume introduces the Microsoft C# programming language, including the Microsoft .NET Common Language Runtime (CLR) and .NET Framework Class Libraries (FCL) that support it. This book's key concepts serve as a roadmap to the online documentation included with the Microsoft .NET Framework SDK.Table of ContentsPreface 1. Introduction C SHARP Language Common Language Runtime Framework Class Library A First C SHARP Program 2. C SHARP Language Reference Identifiers Types Variables Expressions and Operators Statements Organizing Types Inheritance Access Modifiers Classes and Structs Interfaces Arrays Enums Delegates Events try Statements and Exceptions Attributes Unsafe Code and Pointers Preprocessor Directives XML Documentation 3. Programming the .NET Framework Common Types Math Strings Collections Regular Expressions Input/Output Networking Threading Assemblies Reflection Custom Attributes Automatic Memory Management Interop with Native DLLs Interop with COM 4. Framework Class Library Overview Core Types Text Collections Streams and I/O Networking Threading Security Reflection and Metadata Assemblies Serialization Remoting Web Services Data Access XML Graphics Rich Client Applications Web-Based Applications Globalization Configuration Advanced Component Services Diagnostics and Debugging Interoperating with Unmanaged Code Compiler and Tool Support Runtime Facilities Native OS Facilities Undocumented Types 5. Essential .NET Tools A. C SHARP Keywords B. Regular Expressions C. Format Specifiers D. Data Marshaling E. Working with Assemblies F. Namespaces and Assemblies Index
£20.99
O'Reilly Media Writing Excel Macros with VBA
Book SynopsisUpdated for Excel 2002, this text offers Excel power-users, as well as programmers who are unfamiliar with the Excel object model, with an introduction to writing Visual Basic for Applications (VBA) macros and programs for Excel.Table of ContentsPreface 1. Introduction Selecting Special Cells Setting a Chart's Data Point Labels Topics in Learning Excel Programming Part I. The VBA Environment 2. Preliminaries What Is a Programming Language? Programming Style 3. The Visual Basic Editor, Part I The Project Window The Properties Window The Code Window The Immediate Window Arranging Windows 4. The Visual Basic Editor, Part II Navigating the IDE Getting Help Creating a Procedure Run Time, Design Time, and Break Mode Errors Debugging Macros Part II. The VBA Programming Language 5. Variables, Data Types, and Constants Comments Line Continuation Constants Variables and Data Types VBA Operators 6. Functions and Subroutines Calling Functions Calling Subroutines Parameters and Arguments Exiting a Procedure Public and Private Procedures Project References 7. Built-in Functions and Statements The MsgBox Function The InputBox Function VBA String Functions Miscellaneous Functions and Statements Handling Errors in Code 8. Control Statements The If-Then Statement The For Loop The For Each Loop The Do Loop The Select Case Statement A Final Note on VBA Part III. Excel Applications and the Excel Object Model 9. Object Models Objects, Properties, and Methods Collection Objects Object Model Hierarchies Object Model Syntax Object Variables 10. Excel Applications Providing Access to an Application's Features Where to Store an Application An Example Add-In 11. Excel Events The EnableEvents Property Events and the Excel Object Model Accessing an Event Procedure Worksheet Events WorkBook Events Chart Events Application Events QueryTable Refresh Events 12. Custom Menus and Toolbars Menus and Toolbars: An Overview The CommandBars Collection Creating a New Menu Bar or Toolbar Command-Bar Controls Built-in Command-Bar-Control IDs Example: Creating a Menu Example: Creating a Toolbar Example: Adding an Item to an Existing Menu Augmenting the SRXUtils Application 13. Built-In Dialog Boxes The Show Method 14. Custom Dialog Boxes What Is a UserForm Object? Creating a UserForm Object ActiveX Controls Adding UserForm Code Excel's Standard Controls Example: The ActivateSheet Utility ActiveX Controls on Worksheets 15. The Excel Object Model A Perspective on the Excel Object Model Excel Enums The VBA Object Browser 16. The Application Object Properties and Methods of the Application Object Children of the Application Object 17. The Workbook Object The Workbooks Collection The Workbook Object Children of the Workbook Object Example: Sorting Sheets in a Workbook 18. The Worksheet Object Properties and Methods of the Worksheet Object Children of the Worksheet Object Protection in Excel XP Example: Printing Sheets 19. The Range Object The Range Object as a Collection Defining a Range Object Additional Members of the Range Object Children of the Range Object Example: Getting the Used Range Example: Selecting Special Cells 20. Pivot Tables Pivot Tables The PivotTable Wizard The PivotTableWizard Method The PivotTable Object Properties and Methods of the PivotTable Object Children of the PivotTable Object The PivotField Object The PivotCache Object The PivotItem Object PivotCell and PivotItemList Objects Calculated Items and Calculated Fields Example: Printing Pivot Tables 21. The Chart Object Chart Objects and ChartObject Objects Creating a Chart Chart Types Children of the Chart Object The Axes Collection The Axis Object The ChartArea Object The ChartGroup Object The ChartTitle Object The DataTable Object The Floor Object The Legend Object The PageSetup Object The PlotArea Object The Series Object Properties and Methods of the Chart Object Example: Scrolling Through Chart Types Example: Printing Embedded Charts Example: Setting Data Series Labels 22. Smart Tags What Are Smart Tags? SmartTagRecognizer Object SmartTag Object SmartTagAction Object SmartTagOptions Object Part IV. Appendixes A. The Shape Object B. Getting the Installed Printers C. Command Bar Controls D. Face IDs E. Programming Excelfrom Another Application F. High-Level and Low-Level Languages G. New Objects in Excel XP Index
£23.99
O'Reilly Media Secure Programming Cookbook for C C
Book SynopsisBecause secure code is more essential than ever, this new cookbook covers the full range of computer security needs with more than 200 ready-made solutions. It's a valuable asset for anyone who develops software with these highly popular programming languages.Trade Review"This is a book that's long overdue and makes for an interesting and deeply technical read on a topic that we should all core about more. Yes, it's limited to C and C++ readers, but with the majority of key applications being written in these languages that's where the biggest benefit can be had - give the sample chapter a read, and you'll soon be on your way to the books store to buy the rest of it." "A powerful and initially somewhat scary book that will quickly get you thinking about security while you program - as opposed to as an afterthought." - Paul Hudson, LinuxFormat, Christmas 03 - Rating 10/10 - Top Stuff AwardTable of ContentsForeword Preface 1. Safe Initialization 1.1 Sanitizing the Environment 1.2 Restricting Privileges on Windows 1.3 Dropping Privileges in setuid Programs 1.4 Limiting Risk with Privilege Separation 1.5 Managing File Descriptors Safely 1.6 Creating a Child Process Securely 1.7 Executing External Programs Securely 1.8 Executing External Programs Securely 1.9 Disabling Memory Dumps in the Event of a Crash 2. Access Control 2.1 Understanding the Unix Access Control Model 2.2 Understanding the Windows Access Control Model 2.3 Determining Whether a User Has Access to a File on Unix 2.4 Determining Whether a Directory Is Secure 2.5 Erasing Files Securely 2.6 Accessing File Information Securely 2.7 Restricting Access Permissions for New Files on Unix 2.8 Locking Files 2.9 Synchronizing Resource Access Across Processes on Unix 2.10 Synchronizing Resource Access Across Processes on Windows 2.11 Creating Files for Temporary Use 2.12 Restricting Filesystem Access on Unix 2.13 Restricting Filesystem and Network Access on FreeBSD 3. Input Validation 3.1 Understanding Basic Data Validation Techniques 3.2 Preventing Attacks on Formatting Functions 3.3 Preventing Buffer Overflows 3.4 Using the SafeStr Library 3.5 Preventing Integer Coercion and Wrap-Around Problems 3.6 Using Environment Variables Securely 3.7 Validating Filenames and Paths 3.8 Evaluating URL Encodings 3.9 Validating Email Addresses 3.10 Preventing Cross-Site Scripting 3.11 Preventing SQL Injection Attacks 3.12 Detecting Illegal UTF-8 Characters 3.13 Preventing File Descriptor Overflows When Using select( ) 4. Symmetric Cryptography Fundamentals 4.1 Representing Keys for Use in Cryptographic Algorithms 4.2 Generating Random Symmetric Keys 4.3 Representing Binary Keys (or Other Raw Data) as Hexadecimal 4.4 Turning ASCII Hex Keys (or Other ASCII Hex Data) into Binary 4.5 Performing Base64 Encoding 4.6 Performing Base64 Decoding 4.7 Representing Keys (or Other Binary Data) as English Text 4.8 Converting Text Keys to Binary Keys 4.9 Using Salts, Nonces, and Initialization Vectors 4.10 Deriving Symmetric Keys from a Password 4.11 Algorithmically Generating Symmetric Keys from One Base Secret 4.12 Encrypting in a Single Reduced Character Set 4.13 Managing Key Material Securely 4.14 Timing Cryptographic Primitives 5. Symmetric Encryption 5.1 Deciding Whether to Use Multiple Encryption Algorithms 5.2 Figuring Out Which Encryption Algorithm Is Best 5.3 Selecting an Appropriate Key Length 5.4 Selecting a Cipher Mode 5.5 Using a Raw Block Cipher 5.6 Using a Generic CBC Mode Implementation 5.7 Using a Generic CFB Mode Implementation 5.8 Using a Generic OFB Mode Implementation 5.9 Using a Generic CTR Mode Implementation 5.10 Using CWC Mode 5.11 Manually Adding and Checking Cipher Padding 5.12 Precomputing Keystream in OFB, CTR, CCM, or CWC Modes (or with Stream Ciphers) 5.13 Parallelizing Encryption and Decryption in Modes That Allow It (Without Breaking Compatibility) 5.14 Parallelizing Encryption and Decryption in Arbitrary Modes (Breaking Compatibility) 5.15 Performing File or Disk Encryption 5.16 Using a High-Level, Error-Resistant Encryption and Decryption API 5.17 Performing Block Cipher Setup (for CBC, CFB, OFB, and ECB Modes) in OpenSSL 5.18 Using Variable Key-Length Ciphers in OpenSSL 5.19 Disabling Cipher Padding in OpenSSL in CBC Mode 5.20 Performing Additional Cipher Setup in OpenSSL 5.21 Querying Cipher Configuration Properties in OpenSSL 5.22 Performing Low-Level Encryption and Decryption with OpenSSL 5.23 Setting Up and Using RC4 5.24 Using One-Time Pads 5.25 Using Symmetric Encryption with Microsoft's CryptoAPI 5.26 Creating a CryptoAPI Key Object from Raw Key Data 5.27 Extracting Raw Key Data from a CryptoAPI Key Object 6. Hashes and Message Authentication 6.1 Understanding the Basics of Hashes and MACs 6.2 Deciding Whether to Support Multiple Message Digests or MACs 6.3 Choosing a Cryptographic Hash Algorithm 6.4 Choosing a Message Authentication Code 6.5 Incrementally Hashing Data 6.6 Hashing a Single String 6.7 Using a Cryptographic Hash 6.8 Using a Nonce to Protect Against Birthday Attacks 6.9 Checking Message Integrity 6.10 Using HMAC 6.11 Using OMAC (a Simple Block Cipher-Based MAC) 6.12 Using HMAC or OMAC with a Nonce 6.13 Using a MAC That's Reasonably Fast in Software and Hardware 6.14 Using a MAC That's Optimized for Software Speed 6.15 Constructing a Hash Function from a Block Cipher 6.16 Using a Block Cipher to Build a Full-Strength Hash Function 6.17 Using Smaller MAC Tags 6.18 Making Encryption and Message Integrity Work Together 6.19 Making Your Own MAC 6.20 Encrypting with a Hash Function 6.21 Securely Authenticating a MAC (Thwarting Capture Replay Attacks) 6.22 Parallelizing MACs 7. Public Key Cryptography 7.1 Determining When to Use Public Key Cryptography 7.2 Selecting a Public Key Algorithm 7.3 Selecting Public Key Sizes 7.4 Manipulating Big Numbers 7.5 Generating a Prime Number (Testing for Primality) 7.6 Generating an RSA Key Pair 7.7 Disentangling the Public and Private Keys in OpenSSL 7.8 Converting Binary Strings to Integers for Use with RSA 7.9 Converting Integers into Binary Strings for Use with RSA 7.10 Performing Raw Encryption with an RSA Public Key 7.11 Performing Raw Decryption Using an RSA Private Key 7.12 Signing Data Using an RSA Private Key 7.13 Verifying Signed Data Using an RSA Public Key 7.14 Securely Signing and Encrypting with RSA 7.15 Using the Digital Signature Algorithm (DSA) 7.16 Representing Public Keys and Certificates in Binary (DER Encoding) 7.17 Representing Keys and Certificates in Plaintext (PEM Encoding) 8. Authentication and Key Exchange 8.1 Choosing an Authentication Method 8.2 Getting User and Group Information on Unix 8.3 Getting User and Group Information on Windows 8.4 Restricting Access Based on Hostname or IP Address 8.5 Generating Random Passwords and Passphrases 8.6 Testing the Strength of Passwords 8.7 Prompting for a Password 8.8 Throttling Failed Authentication Attempts 8.9 Performing Password-Based Authentication with crypt( ) 8.10 Performing Password-Based Authentication with MD5-MCF 8.11 Performing Password-Based Authentication with PBKDF2 8.12 Authenticating with PAM 8.13 Authenticating with Kerberos 8.14 Authenticating with HTTP Cookies 8.15 Performing Password-Based Authentication and Key Exchange 8.16 Performing Authenticated Key Exchange Using RSA 8.17 Using Basic Diffie-Hellman Key Agreement 8.18 Using Diffie-Hellman and DSA Together 8.19 Minimizing the Window of Vulnerability When Authenticating Without a PKI 8.20 Providing Forward Secrecy in a Symmetric System 8.21 Ensuring Forward Secrecy in a Public Key System 8.22 Confirming Requests via Email 9. Networking 9.1 Creating an SSL Client 9.2 Creating an SSL Server 9.3 Using Session Caching to Make SSL Servers More Efficient 9.4 Securing Web Communication on Windows Using the WinInet API 9.5 Enabling SSL without Modifying Source Code 9.6 Using Kerberos Encryption 9.7 Performing Interprocess Communication Using Sockets 9.8 Performing Authentication with Unix Domain Sockets 9.9 Performing Session ID Management 9.10 Securing Database Connections 9.11 Using a Virtual Private Network to Secure Network Connections 9.12 Building an Authenticated Secure Channel Without SSL 10. Public Key Infrastructure 10.1 Understanding Public Key Infrastructure (PKI) 10.2 Obtaining a Certificate 10.3 Using Root Certificates 10.4 Understanding X.509 Certificate erification Methodology 10.5 Performing X.509 Certificate Verification with OpenSSL 10.6 Performing X.509 Certificate Verification with CryptoAPI 10.7 Verifying an SSL Peer's Certificate 10.8 Adding Hostname Checking to Certificate erification 10.9 Using a Whitelist to Verify Certificates 10.10 Obtaining Certificate Revocation Lists with OpenSSL 10.11 Obtaining CRLs with CryptoAPI 10.12 Checking Revocation Status via OCSP with OpenSSL 11. Random Numbers 11.1 Determining What Kind of Random Numbers to Use 11.2 Using a Generic API for Randomness and Entropy 11.3 Using the Standard Unix Randomness Infrastructure 11.4 Using the Standard Windows Randomness Infrastructure 11.5 Using an Application-Level Generator 11.6 Reseeding a Pseudo-Random Number Generator 11.7 Using an Entropy Gathering Daemon-Compatible Solution 11.8 Getting Entropy or Pseudo-Randomness Using EGADS 11.9 Using the OpenSSL Random Number API 11.10 Getting Random Integers 11.11 Getting a Random Integer in a Range 11.12 Getting a Random Floating-Point Value with Uniform Distribution 11.13 Getting Floating-Point Values with Nonuniform Distributions 11.14 Getting a Random Printable ASCII String 11.15 Shuffling Fairly 11.16 Compressing Data with Entropy into a Fixed-Size Seed 11.17 Getting Entropy at Startup 11.18 Statistically Testing Random Numbers 11.19 Performing Entropy Estimation and Management 11.20 Gathering Entropy from the Keyboard 11.21 Gathering Entropy from Mouse Events on Windows 11.22 Gathering Entropy from Thread Timings 11.23 Gathering Entropy from System State 12. Anti-Tampering 12.1 Understanding the Problem of Software Protection 12.2 Detecting Modification 12.3 Obfuscating Code 12.4 Performing Bit and Byte Obfuscation 12.5 Performing Constant Transforms on Variables 12.6 Merging Scalar Variables 12.7 Splitting Variables 12.8 Disguising Boolean Values 12.9 Using Function Pointers 12.10 Restructuring Arrays 12.11 Hiding Strings 12.12 Detecting Debuggers 12.13 Detecting Unix Debuggers 12.14 Detecting Windows Debuggers 12.15 Detecting SoftICE 12.16 Countering Disassembly 12.17 Using Self-Modifying Code 13. Other Topics 13.1 Performing Error Handling 13.2 Erasing Data from Memory Securely 13.3 Preventing Memory from Being Paged to Disk 13.4 Using Variable Arguments Properly 13.5 Performing Proper Signal Handling 13.6 Protecting against Shatter Attacks on Windows 13.7 Guarding Against Spawning Too Many Threads 13.8 Guarding Against Creating Too Many Network Sockets 13.9 Guarding Against Resource Starvation Attacks on Unix 13.10 Guarding Against Resource Starvation Attacks on Windows 13.11 Following Best Practices for Audit Logging Index
£44.99
O'Reilly Media VB NET Language Pocket Reference
Book SynopsisThis title offers the convenience of a quick reference in a small and convenient format. The guide presents syntax and brief descriptions of each Visual Basic .NET language element.
£7.59
O'Reilly Media C Pocket Reference
Book SynopsisIdeal as an introduction for beginners and a quick reference for advanced programmers, this handy little book consists of two parts - a compact description of the C language and a thematically structured reference to the standard library.Table of ContentsIntroduction Fundamentals C Program Structure Character Sets Identifiers Categories and Scope of Identifiers Basic Types Integer Types Real and Complex Floating Types The Type void Constants Integer Constants Floating Constants Character Constants and String Literals Expressions and Operators Arithmetic Operators Assignment Operators Relational Operators and Logical Operators Logical Operators Bitwise Operators Memory Accessing Operators Other Operators Type Conversions Integer Promotion Usual Arithmetic Conversions Type Conversions in Assignments and Pointers Statements Block and Expression Statements Jumps Loops Unconditional Jumps Declarations General Syntax and Examples Complex Declarations Variables Storage Classes Initialization Derived Types Enumeration Types Structures, Unions, and Bit-Fields Arrays Pointers Type Qualifiers and Type Definitions Functions Function Prototypes Function Definitions Function Calls Functions with Variable Numbers of Arguments Linkage of Identifiers Preprocessing Directives Standard Library Standard Header Files Input and Output Error Handling for Input/Output Functions General File Access Functions File Input/Output Functions Numerical Limits and Number Classification Value Ranges of Integer Types Range and Precision of Real Floating Types Classification of Floating-Point Numbers Mathematical Functions Mathematical Functions for Integer Types Mathematical Functions for Real Floating Types Optimizing Runtime Efficiency Mathematical Functions for Complex Floating Types Type-Generic Macros Error Handling for Mathematical Functions The Floating-Point Environment Character Classification and Case Mapping String Handling Conversion Between Strings and Numbers Multibyte Character Conversion Searching and Sorting Memory Block Management Dynamic Memory Management Time and Date Process Control Communication with the Operating System Signals Non-Local Jumps Error Handling for System Functions Internationalization Index
£16.99
O'Reilly Media Extreme Programming Pocket Guide
Book SynopsisThis new pocket guide serves as a clear-cut introduction to Extreme Programming by summarizing the goals, rules, and general philosophy of XP in a short, concise manner, allowing programmers to quickly come up to speed on why and how they can use this approach in large-scale corporation.Table of ContentsForeword Preface Part I: Why XP? Who Cares About Process, Anyway? The XP Equation XP Values Communication Feedback Simplicity Courage Assuming Sufficiency Sufficient Time Sufficient Resources Constant Cost of Change Developer Effectiveness Freedom to Experiment Part II: Extreme Programming Practices Coding Practices Coding Practice 1: Code and Design Simply Coding Practice 2: Refactor Mercilessly Coding Practice 3: Develop Coding Standards Coding Practice 4: Develop a Common Vocabulary Developer Practices Developer Practice 1: Adopt Test-Driven Development Developer Practice 2: Practice Pair Programming Developer Practice 3: Adopt Collective Code Ownership Developer Practice 4: Integrate Continually Business Practices Business Practice 1: Add a Customer to the Team Business Practice 2: Play the Planning Game Business Practice 3: Release Regularly Business Practice 4: Work at a Sustainable Pace Part III: XP Events Iteration Planning Stories and Tasks Estimates and Schedules The First Iteration The Iteration Releasing Part IV: Extreme Programming Artifacts Story Cards Task Cards The Bullpen Part V: Roles in Extreme Programming The Customer Customer Rights Customer Responsibilities The Developer Developer Rights Developer Responsibilities Supplementary Roles The Tracker The Coach Part VI: Coding, XP Style Do the Simplest Thing That Could Possibly Work You Aren't Gonna Need It Once and Only Once Part VII: Adopting XP Before You Start Eliminating Fear and Working Together Starting Feedback Including Managers and Customers Now That You're Extreme Part VIII:Further Resources XP Resources Index
£13.59
O'Reilly Media VBScript in a Nutshell 2e
Book SynopsisThe second edition of this concise guide to VBScript includes additional chapters and a complete reference that has been fully updated to cover all aspects of the latest version of the software.Table of ContentsForeword Preface I. The Basics 1. Introduction VBScript's History and Uses What VBScript Is Used For: Gluing Together Objects Differences Between VBScript and VBA 2. Program Structure Functions and Procedures Classes Global Code Reusable Code Libraries 3. Data Types and Variables VBScript Data Types: The Many Faces of the Variant Variables and Constants 4. Error Handling and Debugging Debugging Error Handling Common Problem Areas and How to Avoid Them 5. VBScript with Active Server Pages How ASP Works Active Server Pages Object Model 6. Programming Outlook Forms Why Program Outlook Forms? The Form-Based Development Environment Running Your Code Program Flow The Outlook Object Model Accessing Other Object Models 7. Windows Script Host 5.6 Why Use WSH? Running WSH Scripts Program Flow The WSH Object Model WSH Language Elements Accessing Other Object Models 8. VBScript with Internet Explorer The Tag What Can You Do with Client-Side Scripting? Understanding the IE Object Model 9. Windows Script Components The Script Component Wizard Writing Component Code Using the Component WSC Programming Topics II. Reference 10. The Language Reference III. Appendixes A. Language Elements by Category B. VBScript Constants C. Operators D. Locale IDs E. The Script Encoder Index
£29.99
O'Reilly Media Automating System Administration with Perl 2e
Book SynopsisCovering operating systems, technologies, and Perl modules, this title helps you: manage user accounts; monitor filesystems and processes; work with configuration files in important formats such as XML and YAML; administer databases, including MySQL, MS-SQL, and Oracle with DBI; and, work with directory services like LDAP and Active Directory.
£23.99
O'Reilly Media Learning UML 2.0
Book SynopsisSince its original introduction in 1997, the Unified Modeling Language has revolutionized software development. Whether you are looking to use UML as a blueprint language, a sketch tool or as a programming language, this book gives you the need to know information on how to apply UML to your project.
£35.19
O'Reilly Media PHP in a Nutshell
Book SynopsisPHP is a web programming language. This title provides information on PHP, the topic grouping, tips, and examples that complement the online guide. The topics include: object-oriented PHP; networking; string manipulation; working with files; database interaction; XML; Multimedia creation; and Mathematics.Trade Review"...there is no unnecessary waffle, but plenty of code to get your teeth into. It's a desktop guide for quick reference, so not all your queries will be answered, but it will certainly point you in the right direction. An indispensable guide to PHP programming." .net, May 2006Table of ContentsPreface 1. Introduction to PHP PHP History Advantages of PHP Getting Help Getting Certified PHP Resources 2. Installing PHP Installing on Windows Installing on Unix Testing Your Configuration System Configuration 3. The PHP Interpreter Running PHP Scripts Extending PHP PEAR Abnormal Script Termination 4. The PHP Language The Basics of PHP Variables Whitespace Heredoc Brief Introduction to Variable Types Code Blocks Opening and Closing Code Islands Comments Conditional Statements Case Switching Loops Infinite Loops Special Loop Keywords Loops Within Loops Mixed-Mode Processing Including Other Files Functions 5. Variables and Constants Types of Data True or False Strings Integers Floats Automatic Type Conversion Checking Whether a Variable Is Set: isset( ) Variable Scope Variable Variables Superglobals Using $_ENV and $_SERVER References Constants Arrays 6. Operators Arithmetic Operators Assignment Operators String Operators Bitwise Operators Comparison Operators Incrementing and Decrementing Operators Logical Operators Some Operator Examples The Ternary Operator The Execution Operator Operator Precedence and Associativity 7. Function Reference Undocumented Functions Handling Non-English Characters 8. Object-Oriented PHP Conceptual Overview Classes Objects Properties The `this' Variable Objects Within Objects Access Control Modifiers Object Type Information Class Type Hints Constructors and Destructors Copying Objects Comparing Objects with == and === Saving Objects Magic Methods Static Class Methods and Properties Helpful Utility Functions Interfaces Dereferencing Object Return Values 9. HTML Forms What Does It Mean to Be Dynamic? Designing a Form Handling Data Splitting Forms Across Pages Validating Input Form Design Summary 10. Cookies and Sessions Cookies Versus Sessions Using Cookies Using Sessions Storing Complex Data Types 11. Output Buffering Why Use Output Buffering? Getting Started Reusing Buffers Stacking Buffers Flushing Stacked Buffers Reading Buffers Other OB Functions Flushing Output Compressing Output URL Rewriting 12. Security Security Tips Encryption 13. Files Reading Files Creating and Changing Files Moving, Copying, and Deleting Files Other File Functions Checking Whether a File Exists Retrieving File Time Information Dissecting Filename Information Handling File Uploads Locking Files with flock( ) Reading File Permissions and Status Changing File Permissions and Ownership Working with Links Working with Directories Remote Files File Checksums Parsing a Configuration File 14. Databases Using MySQL with PHP PEAR::DB SQLite Persistent Connections MySQL Improved 15. Regular Expressions Basic Regexps with preg_match( ) and preg_match_all( ) Regexp Character Classes Regexp Special Characters Words and Whitespace Regexps Storing Matched Strings Regular Expression Replacements Regular Expression Syntax Examples The Regular Expressions Coach 16. Manipulating Images Getting Started Choosing a Format Getting Arty More Shapes Complex Shapes Outputting Text Loading Existing Images Color and Image Fills Adding Transparency Using Brushes Basic Image Copying Scaling and Rotating Points and Lines Special Effects Using imagefilter( ) Interlacing an Image Getting an Image's MIME Type 17. Creating PDFs Getting Started Adding More Pages and More Style Adding Images PDF Special Effects Adding Document Data 18. Creating Flash A Simple Movie Flash Text Actions Animation 19. XML & XSLT SimpleXML Transforming XML Using XSLT 20. Network Programming Sockets HTTP Sending Mail Curl 21. Distributing Your Code Cross-Platform Code 1: Loading Extensions Cross-Platform Code 2: Using Extensions Cross-Platform Code 3: Path and Line Separators Cross-Platform Code 4: Coping with php.ini Differences Cross-Platform Code 5: Checking the PHP Versionwith phpversion( ) and version_compare( ) 22. Debugging The Most Basic Debugging Technique Making Assertions Triggering Your Own Errors Testing with php_check_syntax( ) Source Highlighting Handling MySQL Errors Exception Handling Backtracing Your Code Custom Error Handlers Custom Exception Handlers Using @ to Disable Errors phpinfo( ) Output Style 23. Performance Write Your Code Sensibly Use the Zend Optimizer Use a PHP Code Cache Compress Your Output Don't Use CGI Debug Your Code Use Persistent Connections Compile Right Index
£19.19
O'Reilly Media PHP Hacks
Book SynopsisDesigned for all PHP Programmers, from newcomers to experts, this guide offers both practical and fun PHP programming techniques. It teaches how to develop more robust PHP applications by improving your database design, automating application testing, and employing design patterns in your PHP scripts and classes.Table of ContentsCredits Preface Chapter 1. Installation and Basics 1. Install PHP 2. Install PEAR Modules Chapter 2. Web Design 3. Create a Skinnable Interface 4. Build a Breadcrumb Trail 5. Create HTML Boxes 6. Add Tabs to Your Web Interface 7. Give Your Customers Formatting Control with XSL 8. Build Lightweight HTML Graphs 9. Properly Size Image Tags 10. Send HTML Email Chapter 3. DHTML 11. Put an Interactive Spreadsheet on Your Page 12. Create Pop-Up Hints 13. Create Drag-and-Drop Lists 14. Build Dynamic HTML Graphs 15. Section Your Content with Spinners 16. Create Drop-Down Stickies 17. Create Dynamic Navigation Menus 18. Obscure JavaScript Dynamically 19. Build a DHTML Binary Clock 20. Tame Ajax with JSON 21. Make a DHTML Slideshow 22. Add Vector Graphics with PHP 23. Build a Color Selector 24. Create Link Graphs 25. Create an Interactive Calendar 26. Create the Google Maps Scrolling Effect Chapter 4. Graphics 27. Create Thumbnail Images 28. Create Beautiful Graphics with SVG 29. Simplify Your Graphics with Objects 30. Split One Image into Multiple Images 31. Create Graphs with PHP 32. Create Image Overlays 33. Access Your iPhoto Pictures with PHP Chapter 5. Databases and XML 34. Design Better SQL Schemas 35. Create Bulletproof Database Access 36. Create Dynamic Database Access Objects 37. Generate CRUD Database Code 38. Read XML on the Cheap with Regular Expressions 39. Export Database Schema as XML 40. Create a Simple XML Query Handler for Database Access 41. Generate Database SQL 42. Generate Database Select Code 43. Convert CSV to PHP 44. Scrape Web Pages for Data 45. Suck Data from Excel Uploads 46. Load Your Database from Excel 47. Search Microsoft Word Documents 48. Create RTF Documents Dynamically 49. Create Excel Spreadsheets Dynamically 50. Create a Message Queue Chapter 6. Application Design 51. Create Modular Interfaces 52. Support Wiki Text 53. Turn Any Object into an Array 54. Create XML the Right Way 55. Fix the Double Submit Problem 56. Create User-Customizable Reports 57. Create a Login System 58. Apply Security by Role 59. Migrate to MD5 Passwords 60. Make Usable URLs with mod_rewrite 61. Build an Ad Redirector 62. Add a Buy Now Button 63. Find Out Where Your Guests Are Coming From 64. Import Information from vCards 65. Create vCard Files from Your Application's Data 66. Create a Shopping Cart Chapter 7. Patterns 67. Observe Your Objects 68. Create Objects with Abstract Factories 69. Flexible Object Creation with Factory Methods 70. Abstract Construction Code with a Builder 71. Separate What from How with Strategies 72. Link Up Two Modules with an Adapter 73. Write Portable Code with Bridges 74. Build Extensible Processing with Chains 75. Break Up Big Classes with Composites 76. Simplify APIs Using a Facade 77. Create Constant Objects with Singletons 78. Ease Data Manipulation with Visitors Chapter 8. Testing 79. Test Your Code with Unit Tests 80. Generate Your Unit Tests 81. Check for Broken Links 82. Test Your Application with imulated Users 83. Test Your Application with Robots 84. Spider Your Site 85. Generate Documentation Automatically Chapter 9. Alternative UIs 86. Create Custom Maps with MapServer 87. Build GUI Interfaces with GTk 88. Send RSS Feeds to Your IM Application Using Jabber 89. IRC Your Web Application 90. Read RSS Feeds on Your PSP 91. Search Google by Link Graph 92. Create a New Interface for Amazon.com 93. Send SMS Messages from Your IM Client 94. Generate Flash Movies on the Fly Chapter 10. Fun Stuff 95. Create Custom Google Maps 96. Create Dynamic Playlists 97. Create a Media Upload/Download enter 98. Check Your Network Game with PHP 99. Put Wikipedia on Your PSP 100. Create a Weather Showdown Index
£19.19
O'Reilly Media Visual Basic 2005 in a Nutshell
Book SynopsisUseful as a reference to the Visual Basic programming language, this title covers almost all the ins and outs of Visual Basic 2005, including features, such as Generics, My Namespace, and operators. It also includes an alphabetical reference to Visual Basic 2005 statements, procedures, functions, and objects.Trade Review"...a genuinely readable reference" - Computer Shopper, June 2006
£29.99
O'Reilly Media MySQL Pocket Reference 2e
Book SynopsisMySQL contains so many features that no administrator or programmer can memorize all the functions. This book is a useful on-the-job companion, organized to help you find the statements you need at work. It gives you reminders on how to use important MySQL functions, especially in conjunction with key parts of the LAMP open source infrastructure.
£10.79