summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--about-csv6
-rw-r--r--boklista.csv254
-rwxr-xr-xparse.scm103
-rw-r--r--patterns.scm21
4 files changed, 384 insertions, 0 deletions
diff --git a/about-csv b/about-csv
new file mode 100644
index 0000000..78ef9d6
--- /dev/null
+++ b/about-csv
@@ -0,0 +1,6 @@
+Varje fält har sitattionstecken runt sig.
+komma mellan varje fält
+
+för author_details:
+- Namn angivet på formen "Efternamn, Förnamn"
+- avgränssare mellan författare är `|'
diff --git a/boklista.csv b/boklista.csv
new file mode 100644
index 0000000..3789c87
--- /dev/null
+++ b/boklista.csv
@@ -0,0 +1,254 @@
+"_id","author_details","title","isbn","publisher","date_published","rating","bookshelf_id","bookshelf","read","series_details","pages","notes","list_price","anthology","location","read_start","read_end","format","signed","loaned_to","anthology_titles","description","genre","language","date_added","goodreads_book_id","last_goodreads_sync_date","last_update_date","book_uuid",
+"1","Linden, Peter van der","Expert C Programming: Deep C Secrets","9780131774292","Prentice Hall","1994-06-24","0","1,","Default,","0","","384","","42,99","0","","","","Paperback","0","","","This book is for the knowledgeable C programmer, this is a second book that gives the C programmers advanced tips and tricks. This book will help the C programmer reach new heights as a professional. Organized to make it easy for the reader to scan to sections that are relevant to their immediate needs.","Computers / Programming Languages / C","English","2017-01-09 13:15:31","0","0000-00-00","2017-01-09 13:15:31","1370f25340e905821dd8aa790ea38363",
+"2","Tarjan, Robert Endre","Data Structures and Network Algorithms","0898711878","Society for Industrial and Applied Mathematics (SIAM)","1987-01-01","0","1,","Default,","0","","140","","","0","","","","Paperback","0","","","There has been an explosive growth in the field of combinatorial algorithms. These algorithms depend not only on results in combinatorics and especially in graph theory, but also on the development of new data structures and new techniques for analyzing algorithms. Four classical problems in network optimization are covered in detail, including a development of the data structures they use and an analysis of their running time. Data Structures and Network Algorithms attempts to provide the reader with both a practical understanding of the algorithms, described to facilitate their easy implementation, and an appreciation of the depth and beauty of the field of graph algorithms.","Mathematics / Discrete Mathematics","","2017-01-09 13:18:18","0","0000-00-00","2017-01-09 13:18:18","5e8ad5cfa121bb509aa77be8c0966dbe",
+"3","Gipp, Jennifer|Schwalbe, Kathy","Information Technology Project Management, Ise","9781423901709","Course Technology","2007","0","1,","Default,","0","","708","","","0","","","","","0","","","","","","2017-02-18 09:08:30","0","0000-00-00","2017-02-18 09:12:31","5d00a9ab0e1b736cd93fc5e1d1f53f96",
+"4","Eriksson, Gunnar|Frängsmyr, Tore","Idéhistoriens huvudlinjer","9789146161370","Wahlström & Widstrand","1992-07-03","0","1,","Default,","0","","226","","","0","","","","Hardcover","0","","","Historien om mänsklighetens tankar kring livet och världen är minst lika viktig för vår förståelse av gångna sekler som historien om den tekniska och materiella utvecklingen, för att inte tala om krig och fältslag.<br /><br />Människans intellektuella utveckling har kantats av ett antal centrala idéer grupperade huvudsakligen kring tre begrepp: Gud, människan och naturen. Hur har människan uppfattat sina relationer till gudomliga krafter och till sina medmänniskor? Hur har hon uppfattat sin plats i universum? På dessa frågor har hon genom alla tider sökt svar, svar som kan ge oss förklaringar till vårt sätt att leva och forma historien.","","Swedish","2017-02-18 09:25:09","0","0000-00-00","2017-02-18 09:25:09","4fdee7632267cd1801fa08ea3d606923",
+"5","Iida, Kazutoshi|Kusano, Tsuyoshi|Sagara, Nobuhiko","I Love Games Graphics","9889705435","AllRightsReserved","2004-01","0","1,","Default,","0","","182","","35,00","0","","","","Hardcover","0","","","The video game explosion of the 80's gave birth to the ""Nintendo generation"" and since then it has had a profound, continuous and far-reaching influence on youth culture. The authors of I Love Games are members of the Nintendo Generation. They grew up with the video game phenomenon and have developed a deep understanding of how this particular aspect of their childhood has impacted and enriched their lives as designers. I Love Games Graphics presents a nostalgic journey through the visual world of games from its early beginnings up until today. I Love Games Graphics also explores the roots of the games industry in Japan, its worldwide dissemination and the relationship between games culture and techno music. Introduction ""Nintendo generation's mentality,"" by Nobuhiko Sagara.","Computers / Programming / Games","English","2017-02-18 09:26:32","0","0000-00-00","2017-02-18 09:26:32","8f7a158e30e59bfdd103545d714b2066",
+"6","Fullam, Scott","Hardware Hacking Projects for Geeks","9780596003142","O'Reilly Media","2004-02-04","0","1,","Default,","0","","352","","29,95","0","","","","Paperback","0","","","Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of <i>Hardware Hacking Projects for Geeks</i> and by the end of the weekend that Furby will be saying things you never imagined.<br /><br />From building an Internet toaster to creating a cubicle intrusion detection system, <i>Hardware Hacking Projects for Geeks</i> offers an array of inventive, customized electronics projects for the geek who can't help looking at a gadget and wondering how it might be ""upgraded."" Beginning with basic hacks, tools, and techniques for those who may not have a background in electronics, the book covers the tools of the hardware hacking trade and basic soldering techniques, then moves into more advanced hacking projects. Clear step-by-step instructions allow even those with no formal electronics- or hardware-engineering skills to hack real hardware in very clever ways.<br /><br />Hacks in the book are rated on a scale of difficulty, cost, and duration. Projects range from those that are truly useful to some things you may have never thought to do, but which are really cool, such as:<br /><br /><br />Building your own arcade game Making radio-controlled cars play laser tag Building an automobile periscope Hacking an 802.11b antenna Building a building size display<br />Perhaps you're an electronics hobbyist who likes to learn by doing. Maybe you hack software and want to see how the other half lives. Or, maybe you've never hacked at all, but you'd like to get started quickly with some projects that do something interesting from the start. If you're any of these, then <i>Hardware Hacking Projects for Geeks</i> will indulge your inner mad scientist. Using the projects in this book as a jumping point for other new and clever hacks, it won't be long before you're looking around, asking, ""I wonder what I can improve next?""","Technology & Engineering / Electronics / General","English","2017-02-18 09:26:55","0","0000-00-00","2017-02-18 09:26:55","9cd34220a0999e8c6de0a56130c784af",
+"7","Ashby, Darren","Electrical Engineering 101, Second Edition: Everything You Should Have Learned in School...but Probably Didn't","9781856175067","Newnes","2005-12-01","0","1,","Default,","0","","320","","48,95","0","","","","Paperback","0","","","Written by an expert electronics engineer who enjoys teaching the practical side of engineering, this book covers all the subjects that a beginning EE needs to know: intuitive circuit and signal analysis, physical equivalents of electrical components, proper use of an oscilloscope, troubleshooting both digital and analog circuits, and much more! Even engineers with years in the industry can benefit from the compendium of practical information provided within.<br>CONTENTS:<br>Chapter 0: What is Electricity Really?<br>Chapter 1: Three Things They Should Have Taught in Engineering 101<br>Chapter 2: Basic Theory<br>Chapter 3: Pieces Parts<br>Chapter 4: The Real World<br>Chapter 5: Tools<br>Chapter 6: Troubleshooting<br>Chapter 7: Touchy-Feely Stuff<br>Appendix<ul><li>Covers the engineering basics that have been either left out of a typical engineer's education or forgotten over time</li><li>No other book offers a wealth of ""insider information"" in one volume, specifically geared to help new engineers and provide a refresher for those with more experience</li><li>updated content throughout, including 2-color diagrams and a new 'Chapter 0 - What is Electricity Really?' </li></ul>","Technology & Engineering / Electronics / Microelectronics","English","2017-02-18 09:27:14","0","0000-00-00","2017-02-18 09:27:14","6144a4fd426297a54696355c1e58ac1b",
+"8","Gustafsson, Fredrik|Gustafson, Fredrik|Bergman, Niclas","Matlab For Engineers Explained","9781852336974","Springer","2003-01-24","0","1,","Default,","0","","232","","","0","","","","Hardcover","0","","","This book is written for students at bachelor and master programs and has four different purposes, which split the book into four parts: 1. To teach first or early year undergraduate engineering students basic knowledge in technical computations and programming using MATLAB. The first part starts from first principles and is therefore well suited both for readers with prior exposure to MATLAB but lacking a solid foundational knowledge of the capabilities of the system and readers not having any previous experience with MATLAB. The foundational knowledge gained from these interactive guided tours of the system will hopefully be sufficient for an effective utilization of MATLAB in the engineering profession, in education and in research. 2. To explain the foundations of more advanced use of MATLAB using the facilities added the last couple of years, such as extended data structures, object orientation and advanced graphics. 3. To give an introduction to the use of MATLAB in typical undergraduate courses in electrical engineering and mathematics, such as calculus, algebra, numerical analysis and statistics. This part also contains introductions and mini-manuals to the most used MATLAB toolboxes. Thus, some chapters require additional MATLAB toolboxes. The idea is to give a brief tutorial on each subject and show the possibilities for applying MATLAB to each application area. We have focused on basic concepts in the applications, without trying to explain all theory behind the examples.","Technology & Engineering / Imaging Systems","","2017-02-18 09:27:41","0","0000-00-00","2017-02-18 09:27:41","1f6c2ff10d9b63aa81e5909d608da1b0",
+"9","Molinaro, Anthony","SQL Cookbook","9780596009762","O'Reilly Media","2005-12-01","0","1,","Default,","0","O'Reilly)","595","","39,95","0","","","","Paperback","0","","","You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.<br /><br />Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is <i>so</i> much more you can do with the language. In the <i>SQL Cookbook</i>, experienced SQL developer Anthony Molinaro shares his favorite SQL techniques and features. You'll learn about:<br /><br /><br /><br /><br />Window functions, arguably the most significant enhancement to SQL in the past decade. If you're not using these, you're missing out<br /><br /><br />Powerful, database-specific features such as SQL Server's PIVOT and UNPIVOT operators, Oracle's MODEL clause, and PostgreSQL's very useful GENERATE_SERIES function<br /><br /><br />Pivoting rows into columns, reverse-pivoting columns into rows, using pivoting to facilitate inter-row calculations, and double-pivoting a result set<br /><br /><br /><i>Bucketization</i>, and why you should never use that term in Brooklyn.<br /><br /><br />How to create histograms, summarize data into buckets, perform aggregations over a moving range of values, generate running-totals and subtotals, and other advanced, data warehousing techniques<br /><br /><br />The technique of <i>walking a string</i>, which allows you to use SQL to parse through the characters, words, or delimited elements of a string<br />Written in O'Reilly's popular Problem/Solution/Discussion style, the <i>SQL Cookbook</i> is sure to please. Anthony's credo is: ""When it comes down to it, we all go to work, we all have bills to pay, and we all want to go home at a reasonable time and enjoy what's still available of our days."" The <i>SQL Cookbook</i> moves quickly from problem to solution, saving you time each step of the way.","Computers / Programming Languages / SQL","English","2017-02-18 09:27:59","0","0000-00-00","2017-02-18 09:27:59","754f75917244e2921a98aabea5b689b8",
+"10","Kercheval, Berry|Perlman, Randa","DHCP: A Guide to Dynamic TCP/IP Network Configuration","9780130997210","Prentice Hall PTR","1999-01-15","0","1,","Default,","0","","187","","44,99","0","","","","Hardcover","0","","","Presents an exceptionally easy-to-understand explanation of this powerful protocol. Discusses how DHCP works from both the client's & server's point of view. Discover how to make the most of DHCP, now & in the future.","Computers / Networking / Intranets & Extranets","English","2017-02-18 09:28:17","0","0000-00-00","2017-02-18 09:28:17","31f639daec93926c1e80645ce82aaf68",
+"11","Jack, Keith","Video Demystified [With 2 CDROMs]","9781878707567","Newnes","1993-08-01","0","1,","Default,","0","","812","","73,95","0","","","","Paperback","0","","","Master video system design with the NEW THIRD EDITION of this essential reference! This book is the ""bible"" for digital video hardware engineers and programmers worldwide, as it contains detailed video information difficult to find elsewhere. The third edition has been completely updated with new chapters on analog and digital video interfaces, H.261 and H.263, consumer DV, and DTV. This is by far the most informative analog and digital video reference available. If you work with video, you need this reference on your shelf! <br><br>Keith Jack has designed more than 25 video and multimedia integrated circuits for such companies as Brooktree and Harris Corporation. He was the designer of the world's first single-chip NTSC/PAL digital encoder/decoder and holds two video processing patents. He is currently director of product marketing for Sigma Designs. <br><br>* Provides international coverage by including European, Asian, and North/South American video standards, methods, and techniques<br><br>* Contains expanded coverage of digital video processing technologies, video compression, digital video interfaces, and the MPEG1 and MPEG2 standards<br><br>* Includes two CDs which provide video test files for MPEG1, MPEG2, H261, and H263 and an electronic version of the book","Technology & Engineering / Television & Video","English","2017-02-18 09:28:33","0","0000-00-00","2017-02-18 09:28:33","b64181f5c36091e7c47080713061d784",
+"12","Jr., Henry S. Warren|Warren, Henry S.","Hacker's Delight","9780201914658","Addison-Wesley","2002-07-27","0","1,","Default,","0","","306","","59,99","0","","","","Hardcover","0","","","A collection useful programming advice the author has collected over the years; small algorithms that make the programmer's task easier. * At long last, proven short-cuts to mastering difficult aspects of computer programming * Learn to program at a more advanced level than is generally taught in schools and training courses, and much more advanced than can be learned through individual study/experience. * An instant cult classic for programmers! Computer programmers are often referred to as hackers -- solitary problem solvers engrossed in a world of code as they seek elegant solutions to building better software. While many view these unique individuals as ""madmen,"" the truth is that much of the computer programmer's job involves a healthy mix of arithmetic and logic. In Hacker's Delight, veteran programmer Hank Warren shares the collected wisdom -- namely tips and tricks -- from his considerable experience in the world of application development. The resulting work is an irresistible collection that will help even the most seasoned programmers better their craft. Henry S. Warren Jr. has had a 40-year career with IBM, spanning the computer field from the IBM 704 to PowerPC. He has worked on various military command and control systems, and on the SETL project under Jack Schwartz at NYU. Since 1973 he has been in IBM's Research Division at Yorktown Heights, New York. Here he has done compiler and computer architecture work on the 801 computer and its several variants through PowerPC. Presently he is working on the Blue Gene petaflop computer project. He received his Ph.D. in Computer Science from the Courant Institute at New York University in 1980.","Computers / Programming / General","English","2017-02-18 09:28:46","0","0000-00-00","2017-02-18 09:28:46","94f09c690d45820f98d2cebd3fbdb46f",
+"13","Inc., Adobe Systems|inc, Adobe systems","PostScript Language Tutorial and Cookbook","9780201101799","Addison-Wesley Professional","1985-01-11","0","1,","Default,","0","","256","","29,99","0","","","","Paperback","0","","","Using numerous annotated examples and short programs, the tutorial provides a step-by-step guided tour of PostScript, highlighting those qualities that make it such a unique and powerful language. The cookbook offers a collection of some of the most useful techniques and procedures available to PostScript programmers.","PostScript (Computer program language)","English","2017-02-18 09:29:02","0","0000-00-00","2017-02-18 09:29:02","caf1c8331ebcb2512f14dc2990d61727",
+"14","Incorporated, Adobe Systems|ADOBE, |Systems, Adobe","PostScript Language Reference Manual","9780201101744","Addison Wesley Longman Publishing Co","1990-06","0","1,","Default,","0","","321","","","0","","","","Paperback","0","","","This powerful and flexible language efficiently describes the appearance of text, sampled images, and graphics on a printed page or display. PostScript language interpreters have been incorporated into some of today's most innovative printers, typesetters, film records, and computer display environments. <p> The <b>PostScript Language Reference Manual</b> from Adobe Systems Incorporated is the official reference to the PostScript language. This entirely new and up-to-date <b>Second Edition</b> offers the most comprehensive coverage of the entire PostScript language, including the recent advancements of PostScript Level 2.</p> <p> The <b>PostScript Language Reference Manual</b>, contains the complete semantics of every PostScript language operator, the Display PostScript System, PostScript Level 1 (the original PostScript language), and PostScript Level 2, the first major revision to the language since its release in 1985. PostScript Level 2 incorporates recent extensions to the language and many new features including:</p> <p> </p> CMYK color \n Composite fonts \n Forms \n Patterns \n Color separations \n Resource management \n New memory management \n Improved screening algorithms \n Data compression/decompression \n Support for printer-specific features \n Device-independent, CIE-based color \n Optimized text and graphics operators \n <p>As PostScript continues to be the industry standard page description language for imaging high-quality text and graphics, the <b>PostScript Language Reference Manual</b>, remains the definitive resource for all PostScript language programmers.</p> <br /><br />","Computers / Programming Languages / General","English","2017-02-18 09:29:32","0","0000-00-00","2017-02-18 09:29:32","e7db6912f976609c6bc9f5960837d4c8",
+"15","Heuman, Lars","Process- Och Straffratt for Juridisk Oversiktskurs","9139203689","Not Avail","2004-01-01","0","1,","Default,","0","","128","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 09:30:32","0","0000-00-00","2017-02-18 09:30:32","e4138f77eaa10e9f6a5f66a75d1c4c9e",
+"16","Pharr, Matt|Fernando, Randima","Gpu Gems 2: Programming Techniques for High-Performance Graphics and General-Purpose Computation","9780321335593","Addison-Wesley Professional","2005-03-13","0","1,","Default,","0","","880","","74,99","0","","","","Hardcover","0","","","""GPU Gems 2"" isn t meant to simply adorn your bookshelf it s required reading for anyone trying to keep pace with the rapid evolution of programmable graphics. If you re serious about graphics, this book will take you to the edge of what the GPU can do. <br /> "" Remi Arnaud, Graphics Architect at Sony Computer Entertainment"" The topics covered in ""GPU Gems 2"" are critical to the next generation of game engines. <br /> "" Gary McTaggart, Software Engineer at Valve, Creators of ""Half-Life ""and"" Counter-Strike<br /><br />This sequel to the best-selling, first volume of ""GPU Gems"" details the latest programming techniques for today s graphics processing units (GPUs). As GPUs find their way into mobile phones, handheld gaming devices, and consoles, GPU expertise is even more critical in today s competitive environment. Real-time graphics programmers will discover the latest algorithms for creating advanced visual effects, strategies for managing complex scenes, and advanced image processing techniques. Readers will also learn new methods for using the substantial processing power of the GPU in other computationally intensive applications, such as scientific computing and finance. Twenty of the book s forty-eight chapters are devoted to GPGPU programming, from basic concepts to advanced techniques. Written by experts in cutting-edge GPU programming, this book offers readers practical means to harness the enormous capabilities of GPUs.<br /><br />Major topics covered include: Geometric ComplexityShading, Lighting, and ShadowsHigh-Quality RenderingGeneral-Purpose Computation on GPUs: A PrimerImage-Oriented ComputingSimulation and Numerical Algorithms<br /><br />Contributors are from the following corporations and universities:<br /><br />1C: Maddox Games<br />2015<br />Apple Computer<br />Armstrong State University<br />Climax Entertainment<br />Crytek<br />discreet<br />ETH Zurich<br />GRAVIR/IMAG INRIA<br />GSC Game World<br />Lionhead Studios<br />Lund University<br />Massachusetts Institute of Technology<br />mental images<br />Microsoft Research<br />NVIDIA Corporation<br />Piranha Bytes<br />Siemens Corporate Research<br />Siemens Medical Solutions<br />Simutronics Corporation<br />Sony Pictures Imageworks<br />Stanford University<br />Stony Brook University<br />Technische Universitat Munchen<br />University of California, Davis<br />University of North Carolina at Chapel Hill<br />University of Potsdam<br />University of Tokyo<br />University of Toronto<br />University of Utah<br />University of Virginia<br />University of Waterloo<br />Vienna University of Technology<br />VRVis Research Center<br />Section editors include NVIDIA engineers: Kevin Bjorke, Cem Cebenoyan, Simon Green, Mark Harris, Craig Kolb, and Matthias Wloka<br /><br />The accompanying CD-ROM includes complementary examples and sample programs. <br /> ""","Computers / Programming / Games","English","2017-02-18 09:30:52","0","0000-00-00","2017-02-18 09:30:52","5321ebe6f3bd06f17e10e4587595152a",
+"17","Hoglund, Greg|Butler, Jamie|Butler, James","Rootkits: Subverting the Windows Kernel","9780321294319","Addison-Wesley Professional","2005-07-01","0","1,","Default,","0","","352","","64,99","0","","","","Paperback","0","","","""It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits.""<br /><i>--Mark Russinovich, editor, </i> Windows IT Pro / Windows &amp; .NET Magazine ""This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, <i> <b>Rootkits</b> </i> will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding.""<br /><i>--Tony Bautts, Security Consultant; CEO, Xtivix, Inc.</i> ""This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible.""<br /><i>--Jennifer Kolde, Security Consultant, Author, and Instructor</i> ""What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. <br />""Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. <br />""Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned.""<br /><i>--Gary McGraw, Ph.D., CTO, Cigital, coauthor of</i> Exploiting Software <i>(2004) and</i> Building Secure Software <i>(2002), both from Addison-Wesley</i> ""Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list.""<br /><i>--Harlan Carvey, author of</i> Windows Forensics and Incident Recovery <i>(Addison-Wesley, 2005)</i> Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to<br />Understand the role of rootkits in remote command/control and software eavesdropping<br />Build kernel rootkits that can make processes, files, and directories invisible<br />Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects<br />Work with layered drivers to implement keyboard sniffers and file filters<br />Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks","Computers / Security / Online Safety & Privacy","English","2017-02-18 09:31:03","0","0000-00-00","2017-02-18 09:31:03","18dc48693bd901f5cec483beded9ddbb",
+"18","Cringely, Robert X.","Accidental Empires","9780887308550","HarperBusiness","1996-09-13","0","1,","Default,","0","","384","","16,99","0","","","","Paperback","0","","","Computer manufacturing is--after cars, energy production and illegal drugs--the largest industry in the world, and it's one of the last great success stories in American business. <em>Accidental Empires</em> is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core--Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.","Business & Economics / General","English","2017-02-18 09:31:14","0","0000-00-00","2017-02-18 09:31:14","5ee5fc0d492597e33fffc44a93b829be",
+"19","Friedl, Jeffrey E.F.|Friedl, Jeffrey E. F.","Mastering Regular Expressions","9780596002893","O'Reilly Media","2002-07-26","0","1,","Default,","0","","496","","39,95","0","","","","Paperback","0","","","Supported by tools, languages, and environments ranging from Emacs to VB .NET, regular expressions let you streamline text and data searching and processing. Whether you're new to their advantages or out to boost your expertise, here's how to add them to your arsenal.","Computers / Desktop Applications / Word Processing","English","2017-02-18 09:31:28","0","0000-00-00","2017-02-18 09:31:28","5fd0966eb9027770f628456a938864f4",
+"20","Collins-Sussman, Ben|Fitzpatrick, Brian W.|Pilato, C. Michael|Fitzpatrick, Brian|Pilato, Michael","Version Control with Subversion","9780596004484","O'Reilly Media","2004-06-29","0","1,","Default,","0","","320","","34,95","0","","","","Paperback","0","","","One of the greatest frustrations in most software projects is version control: the art of managing changes to information. Today's increasingly fast pace of software development--as programmers make small changes to software one day only to undo them the next--has only heightened the problem; consecutive work on code or single-programmer software is a rare sight these days. Without careful attention to version control, concurrent and collaborative work can create more headaches than it solves. This is where Subversion comes into play.<br /><br />Written by members of the Subversion open source development team, <i>Version Control with Subversion</i> introduces the powerful new versioning tool designed to be the successor to the Concurrent Version System or CVS. CVS users will find the ""look and feel"" Subversion comfortably familiar, but under the surface it's far more flexible, robust, and usable, and more importantly, it improves on CVS's more notable flaws.<br /><br />The book begins with a general introduction to Subversion, the basic concepts behind version control, and a guided tour of Subversion's capabilities and structure. With thorough attention to detail, the authors cover every aspect of installing and configuring Subversion for managing a programming project, documentation, or any other team-based endeavor. Later chapters cover the more complex topics of branching, repository administration, and other advanced features such as properties, externals, and access control. The book ends with reference material and appendices covering a number of useful topics such as a Subversion complete reference and troubleshooting guide.<br /><br /><i>Version Control with Subversion</i> aims to be useful to readers of widely different backgrounds, from those with no previous experience in version control to experienced sysadmins. If you've never used version control, you'll find everything you need to get started in this book. And if you're a seasoned CVS pro, this book will help you make a painless leap into Subversion.<br />","Computers / Programming / General","English","2017-02-18 09:32:25","0","0000-00-00","2017-02-18 09:32:25","4c65dcb6346d3eb654f80e23ae528872",
+"21","SAAB, ","Tema","9197246409","Datasaabs vänner","1994","0","1,","Default,","0","","92","","","0","","","","","0","","","","","","2017-02-18 09:33:33","0","0000-00-00","2017-02-18 09:33:33","dc48cb9670396598ec2a0a4fc2f0e9aa",
+"22","Weiner, Zach|Weinersmith, Zach","Save Yourself, Mammal!: A Saturday Morning Breakfast Cereal Collection","9780982853702","Breadpig","2011-07-12","0","1,","Default,","0","","88","","18,00","0","","","","Paperback","0","","","<i>Saturday Morning Breakfast Cereal</i> (<i>SMBC</i>) is at heart a geek comic, but it nevertheless addresses a broad range of topics, such as love, relationships, economics, politics, religion, science, and philosophy. It is one of the fastest growing comics online, having sextupled in readership since 2008. <i>SMBC</i> appeals to many different groups, as evidenced by the fact it has been featured on a variety of important websites and blogs, including <i>The Economist, Glamour, BoingBoing, Bad Astronomy, Blastr, Blues News, Joystiq, The Washington Post, Freakonomics,</i> and more. <i>SMBC</i> has never released a book, which is almost unheard of for a comic with such an extensive archive, making this first-ever collection highly anticipated. BreadPig donates its profits to DonorsChoose.org, a not-for-profit organization that aims to improve public education by empowering every teacher to be a change-maker and enabling any citizen to be a philanthropist.","Humor / Form / Comic Strips & Cartoons","English","2017-02-18 09:33:58","0","0000-00-00","2017-02-18 09:33:58","b7044a86738f5979778b7a7dcb30eaba",
+"23","Poe, Edgar Allan","Tales of Mystery and Terror","9780140367201","Puffin Classics","1995-08-01","0","1,","Default,","0","Puffin Classics","235","","4,99","0","","","","Paperback","0","","","<b> Tales to make your spine tingle from the master of Gothic horror </b><br /><br />Thirteen stories of horror, suspense, and the supernatural that will keep you on the edge of your seat to the very last page. ""The Pit and the Pendulum"", ""The Fall of the House of Usher"", and ""The Black Cat"" are just three of Edgar Allan Poe's most famous tales in this chilling, enthralling collection.<br /><br />Complete and unabridged","Juvenile Fiction / Classics","English","2017-02-18 09:34:20","0","0000-00-00","2017-02-18 09:34:20","f55121ea818e746fd4fef5a3de9166b1",
+"24","Kidder, Tracy","Soul of a New Machine, The","9780316491976","Back Bay Books","2000-06-01","0","1,","Default,","0","","320","","16,00","0","","","","Paperback","0","","","The computer revolution brought with it new methods of getting work done—just look at today's news for reports of hard-driven, highly-motivated young software and online commerce developers who sacrifice evenings and weekends to meet impossible deadlines. Tracy Kidder got a preview of this world in the late 1970s when he observed the engineers of Data General design and build a new 32-bit minicomputer in just one year. His thoughtful, prescient book, <i>The Soul of a New Machine</i>, tells stories of 35-year-old ""veteran"" engineers hiring recent college graduates and encouraging them to work harder and faster on complex and difficult projects, exploiting the youngsters' ignorance of normal scheduling processes while engendering a new kind of work ethic.<br /><br />These days, we are used to the ""total commitment"" philosophy of managing technical creation, but Kidder was surprised and even a little alarmed at the obsessions and compulsions he found. From in-house political struggles to workers being permitted to tease management to marathon 24-hour work sessions, <i>The Soul of a New Machine</i> explores concepts that already seem familiar, even old-hat, less than 20 years later. Kidder plainly admires his subjects; while he admits to hopeless confusion about their work, he finds their dedication heroic. The reader wonders, though, what will become of it all, now and in the future. <i>—Rob Lightner</i>","","English","2017-02-18 09:34:36","0","0000-00-00","2017-02-18 09:34:36","ba2369e163da3f18bb10260636f0c8e3",
+"25","Stoll, Clifford|Stoll, Cliff","Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, The","9781416507789","Pocket Books","2005-09-13","0","1,","Default,","0","","399","","16,99","0","","","","Paperback","0","","","<I>Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is ""a computer-age detective story, instantly fascinating [and] astonishingly gripping""</I> (Smithsonian). <BR> Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was ""Hunter"" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.","True Crime / Espionage","English","2017-02-18 09:35:01","0","0000-00-00","2017-02-18 09:35:01","aad35baede656f7b71181bb15f9964f5",
+"26","Nissen, Jörgen","Pojkarna vid datorn : unga entusiaster i datateknikens värld","9171391282","Brutus Östlings bokf Symposion","1993-04-01","0","1,","Default,","0","","366","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 09:35:41","0","0000-00-00","2017-02-18 09:35:41","1acf0eed57311a700f58463c7b2f07ed",
+"27","Wells, Michael A.|Tupy, Jonathan L.|Tupy, Jon","Biochemistry: An Electronic Companion [With 195 Page Workbook]","9781888902686","Cogito","1998-09-25","0","1,","Default,","0","Electronic Companion","195","","49,95","0","","","","Paperback","0","","","This is a multimedia study guide that will help you achieve better grades. Developed by a prominent educator and researcher, this will compliment any Biochemistry text.","","English","2017-02-18 09:36:09","0","0000-00-00","2017-02-18 09:36:09","2c764c17e635fb02523133b6b8c5c132",
+"28","Hofstadter, Douglas R.|Wahlén, Jan","Gödel, Escher, Bach: Ett evigt Gyllene Band","9176083314","Brombergs","1992","0","1,","Default,","0","","808","","","0","","","","Hardcover","0","","","""Every few decades an unknown author brings out a boof of such depth, clarity range, wit beauty &amp; originality that it is recognized at once as a major literary event-this is such a work.""--Scientific American<br />Overview<br />List of Illustrations<br />Words of Thanks<br />GEB<br />Introduction: A Musico-Logical Offering<br />Three-Part Invention<br />The MU-puzzle <br />Two-Part Invention<br />Meaning &amp; Form in Mathematics <br />Sonata for Unaccompanied Achilles<br />Figure &amp; Ground <br />Contracrostipunctus <br />Consistency, Completeness &amp; Geometry<br />Little Harmonic Labyrinth <br />Recursive Structures &amp; Processes<br />Canon by Intervallic Augmentation <br />The Location of Meaning <br />Chromatic Fantasy &amp; Feud<br />The Propositional Calculus<br />Crab Canon<br />Typographical Number Theory<br />A Mu Offering<br />Mumon &amp; Godel<br />EGB<br />Prelude...<br />Levels of Description &amp; Computer Systems<br />...Ant Fugue <br />Brains &amp; Thoughts <br />English French German Suite<br />Minds &amp; Thoughts <br />Aria with Diverse Variations<br />BlooP &amp; FlooP &amp; GlooP<br />Air on G's String <br />On Formally Undecidable Propositions of TNT &amp; Related Systems<br />Birthday Cantatatata...<br />Jumping out of the System <br />Edifying Thoughts of a Tobacco Smoker <br />Self-Ref &amp; Self-Rep <br />The Magnificrab, Indeed <br />Church, Turing, Tarski &amp; Others <br />Shrdlu, Toy of Man's Designing <br />Artificial Intelligence: Retrospects<br />Contrafactus <br />Artificial Intelligence: Prospects<br />Sloth Canon <br />Strange Loops or Tangled Hierarchies <br />Six-Part Ricercar<br />Notes<br />Bibliography<br />Credits<br />Index","","","2017-02-18 09:36:42","0","0000-00-00","2017-02-18 09:36:42","e230700ffaf5b4c8006083179523d1da",
+"29","Knuth, Donald Ervin|Knuth, Donald E.","Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1, The","0201038048","Addison-Wesley Professional","2011-01-22","0","1,","Default,","0","Art of Computer Programming","912","","79,99","0","","","","Hardcover","0","","","<b>The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1</b> <b> </b> Knuth s multivolume analysis of algorithms is widely recognized as the definitive description of classical computer science. The first three volumes of this work have long comprised a unique and invaluable resource in programming theory and practice. Scientists have marveled at the beauty and elegance of Knuth s analysis, while practicing programmers have successfully applied his cookbook solutions to their day-to-day problems. <i>The level of these first three volumes has remained so high, and they have displayed so wide and deep a familiarity with the art of computer programming, that a sufficient review of future volumes could almost be: Knuth, Volume n has been published. </i> <i>Data Processing Digest</i> Knuth, Volume n has been published, where n = 4A. <i></i> <i>In this long-awaited new volume, the old master turns his attention to some of his favorite topics in broadword computation and combinatorial generation (exhaustively listing fundamental combinatorial objects, such as permutations, partitions, and trees), as well as his more recent interests, such as binary decision diagrams. </i> <i></i> <i>The hallmark qualities that distinguish his previous volumes are manifest here anew: detailed coverage of the basics, illustrated with well-chosen examples; occasional forays into more esoteric topics and problems at the frontiers of research; impeccable writing peppered with occasional bits of humor; extensive collections of exercises, all with solutions or helpful hints; a careful attention to history; implementations of many of the algorithms in his classic step-by-step form. </i> <i></i> <i>There is an amazing amount of information on each page. Knuth has obviously thought long and hard about which topics and results are most central and important, and then, what are the most intuitive and succinct ways of presenting that material. Since the areas that he covers in this volume have exploded since he first envisioned writing about them, it is wonderful how he has managed to provide such thorough treatment in so few pages</i>. Frank Ruskey, Department of Computer Science, University of Victoria The book is Volume 4A, because Volume 4 has itself become a multivolume undertaking. Combinatorial searching is a rich and important topic, and Knuth has too much to say about it that is new, interesting, and useful to fit into a single volume, or two, or maybe even three. This book alone includes approximately 1500 exercises, with answers for self-study, plus hundreds of useful facts that cannot be found in any other publication. Volume 4A surely belongs beside the first three volumes of this classic work in every serious programmer s library. Finally, after a wait of more than thirty-five years, the first part of Volume 4 is at last ready for publication. Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. Ebook (PDF version) produced by Mathematical Sciences Publishers (MSP), http: //msp.org <br /><b>The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e </b> ISBN: 0321751043 ""","","English","2017-02-18 09:37:15","0","0000-00-00","2017-02-18 09:37:15","ecdbb67e291976c6eb26d3f760d3639d",
+"30","Hoyte, Doug","Let Over Lambda","9781435712751","Lulu.com","2008-04-02","0","1,","Default,","0","","384","","39,95","0","","","","Paperback","0","","","Let Over Lambda is one of the most hardcore computer programming books out there. Starting with the fundamentals, it describes the most advanced features of the most advanced language: Common Lisp. Only the top percentile of programmers use lisp and if you can understand this book you are in the top percentile of lisp programmers. If you are looking for a dry coding manual that re-hashes common-sense techniques in whatever langue du jour, this book is not for you. This book is about pushing the boundaries of what we know about programming. While this book teaches useful skills that can help solve your programming problems today and now, it has also been designed to be entertaining and inspiring. If you have ever wondered what lisp or even programming itself is really about, this is the book you have been looking for.","Computers / General","English","2017-02-18 09:37:45","0","0000-00-00","2017-02-18 09:37:45","3271dbda551bf244cbe412217d289132",
+"31","O'Sullivan, Bryan|Goerzen, John|Stewart, Donald Bruce|Stewart, Don","Real World Haskell: Code You Can Believe In","9780596514983","O'Reilly Media","2008-12-02","0","1,","Default,","0","","720","","49,99","0","","","","Paperback","0","","","This easy-to-use, fast-moving tutorial introduces you to functional programming with Haskell. You'll learn how to use Haskell in a variety of practical ways, from short scripts to large and demanding applications. <i>Real World Haskell</i> takes you through the basics of functional programming at a brisk pace, and then helps you increase your understanding of Haskell in real-world issues like I/O, performance, dealing with data, concurrency, and more as you move through each chapter.<br /><br /> With this book, you will:<br /><br /><br />Understand the differences between procedural and functional programming Learn the features of Haskell, and how to use it to develop useful programs Interact with filesystems, databases, and network services Write solid code with automated tests, code coverage, and error handling Harness the power of multicore systems via concurrent and parallel programming You'll find plenty of hands-on exercises, along with examples of real Haskell programs that you can modify, compile, and run. Whether or not you've used a functional language before, if you want to understand why Haskell is coming into its own as a practical language in so many major organizations, <i>Real World Haskell</i> is the best place to start.","","English","2017-02-18 09:38:02","0","0000-00-00","2017-02-18 09:38:02","b94f4020273305919a11916d81f0bf2c",
+"32","Ashenden, Peter J.","Designer's Guide to VHDL [With CDROM], The","9781558606746","Morgan Kaufmann","1996-01-01","0","1,","Default,","0","Systems on Silicon","759","","82,95","0","","","","Paperback","0","","","<br><p><br>Since the publication of the first edition of <i>The Designer's Guide to VHDL</i> in 1996, digital electronic systems have increased exponentially in their complexity, product lifetimes have dramatically shrunk, and reliability requirements have shot through the roof. As a result more and more designers have turned to VHDL to help them dramatically improve productivity as well as the quality of their designs.<br><p><br>VHDL, the IEEE standard hardware description language for describing digital electronic systems, allows engineers to describe the structure and specify the function of a digital system as well as simulate and test it before manufacturing. In addition, designers use VHDL to synthesize a more detailed structure of the design, freeing them to concentrate on more strategic design decisions and reduce time to market. Adopted by designers around the world, the VHDL family of standards have recently been revised to address a range of issues, including portability across synthesis tools.<br><p><br>This best-selling comprehensive tutorial for the language and authoritative reference on its use in hardware design at all levels--from system to gates--has been revised to reflect the new IEEE standard, VHDL-2001. Peter Ashenden, a member of the IEEE VHDL standards committee, presents the entire description language and builds a modeling methodology based on successful software engineering techniques. Reviewers on Amazon.com have consistently rated the first edition with five stars. This second edition updates the first, retaining the authors unique ability to teach this complex subject to a broad audience of students and practicing professionals. <br><br>* Details how the new standard allows for increased portability across tools.<br>* Covers related standards, including the Numeric Synthesis Package and the Synthesis Operability Package, demonstrating how they can be used for digital systems design.<br>* Presents four extensive case studies to demonstrate and combine features of the language taught across multiple chapters.<br>* Requires only a minimal background in programming, making it an excellent tutorial for anyone in computer architecture, digital systems engineering, or CAD.","Computers / Programming Languages / General","English","2017-02-18 09:38:17","0","0000-00-00","2017-02-18 09:38:17","edc7266538d74acb5211a5bb926d5bb2",
+"33","Hamill, Paul|Hendrickson, Mike","Unit Test Frameworks","9780596006891","O'Reilly Media","2004-11-09","0","1,","Default,","0","","216","","29,95","0","","","","Paperback","0","","","Unit test frameworks are a key element of popular development methodologies such as eXtreme Programming (XP) and Agile Development. But unit testing has moved far beyond eXtreme Programming; it is now common in many different types of application development. Unit tests help ensure low-level code correctness, reduce software development cycle time, improve developer productivity, and produce more robust software.<br /><br />Until now, there was little documentation available on unit testing, and most sources addressed specific frameworks and specific languages, rather than explaining the use of unit testing as a language-independent, standalone development methodology. This invaluable new book covers the theory and background of unit test frameworks, offers step-by-step instruction in basic unit test development, provides useful code examples in both Java and C++, and includes details on some of the most commonly used frameworks today from the XUnit family, including JUnit for Java, CppUnit for C++, and NUnit for .NET.<br /><br /><i>Unit Test Frameworks</i> includes clear, concise, and detailed descriptions of:<br /><br /><br />The theory and design of unit test frameworks<br />Examples of unit tests and frameworks<br />Different types of unit tests<br />Popular unit test frameworks<br />And more<br />It also includes the complete source code for CppUnit for C++, and NUnit for .NET.","Computers / Programming Languages / Java","English","2017-02-18 09:38:28","0","0000-00-00","2017-02-18 09:38:28","35afa14972af5d2722b246cf3499ad23",
+"34","Aho, Alfred V.|Kernighan, Brian W.|Weinberger, Peter J.","AWK Programming Language, The","9780201079814","Pearson","1988-01-11","0","1,","Default,","0","","210","","151,40","0","","","","Paperback","0","","","Originally developed by Alfred Aho, Brian Kernighan, and Peter Weinberger in 1977, AWK is a pattern-matching language for writing short programs to perform common data-manipulation tasks. In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined funcitons. This new version is available for both UNIX and MS-DOS.","Computers / Programming Languages / General","English","2017-02-18 09:38:42","0","0000-00-00","2017-02-18 09:38:42","f72035b513a6cc585893eff53462da18",
+"35","Löwgren, Jonas","Human-computer interaction: What every system developer should know","9144396511","Studentlitteratur","1993","0","1,","Default,","0","","134","","","0","","","","Paperback","0","","","Considering the users and the situations of use is becoming increasingly important in industrial software development. It is no longer enough to merely provide a system; it must also suit the users' needs and abilities.<br /><br />Developers concerned with the user interface and user services of a system have to know the basics of how people interact with computers. They need to recognise the importance of studying prospective users and their work. An understanding of the concept of usability and how usability can be specified and tested is also essential. Finally, it is necessary to be aware of the basic building blocks for design and how designs can be realised in prototypes and implemented systems. This book covers all these issues. <br /><br />The book should be of interest to professional system developers and project managers interested in usable systems. It is also intended for introductory human-computer interaction courses at universities as it contains well-proven exercises, suggested reading material, advice to the teacher and to the student.","","English","2017-02-18 09:40:15","0","0000-00-00","2017-02-18 09:40:15","f6a8c957abc5d558adc5674f4ffe1004",
+"36","Stallman, Richard M.|McGrath, Roland|Smith, Paul D.","Gnu Make: A Program For Directing Recompilation, For Version 3.81","9781882114832","Free Software Foundation","2004-06-30","0","1,","Default,","0","","196","","25,00","0","","","","Paperback","0","","","GNU Make: A Program for Directing Recompilation, for version 3.81 Paperback - June 30, 2004\nby Richard M. Stallman (Author), Roland McGrath (Author),","Computers / Utilities","English","2017-02-18 09:40:36","0","0000-00-00","2017-02-18 09:40:36","777f4afde384cdf3d93d17e1e4bd9fdb",
+"37","Barr, Michael|Oram, Andy","Programming Embedded Systems in C and C++","9781565923546","O'Reilly Media","1999-02-06","0","1,","Default,","0","","200","","29,95","0","","","","Paperback","0","","","Embedded software is in almost every electronic device designed today. There is software hidden away inside our watches, microwaves, VCRs, cellular telephones, and pagers; the military uses embedded software to guide smart missiles and detect enemy aircraft; communications satellites, space probes, and modern medicine would be nearly impossible without it. Of course, someone has to write all that software, and there are thousands of computer scientists, electrical engineers, and other professionals who actually do.<br /><br />Each embedded system is unique and highly customized to the application at hand. As a result, embedded systems programming is a widely varying field that can take years to master. However, if you have some programming experience and are familiar with C or C++, you're ready to learn how to write embedded software. The hands-on, no-nonsense style of this book will help you get started by offering practical advice from someone who's been in your shoes and wants to help you learn quickly.<br /><br />The techniques and code examples presented here are directly applicable to real-world embedded software projects of all sorts. Even if you've done some embedded programming before, you'll still benefit from the topics in this book, which include:<br /><br /><br />Testing memory chips quickly and efficiently<br />Writing and erasing Flash memory<br />Verifying nonvolatile memory contents with CRCs<br />Interfacing to on-chip and external peripherals<br />Device driver design and implementation<br />Optimizing embedded software for size and speed<br />So whether you're writing your first embedded program, designing the latest generation of hand-held whatchamacalits, or simply managing the people who do, this book is for you.","Computers / Programming Languages / C","English","2017-02-18 09:40:57","0","0000-00-00","2017-02-18 09:40:57","905c0cc3ec56c728f3328ad20163ce3a",
+"38","Dougherty, Dale","sed & awk","9780937175590","O'Reilly Media","1990-11-08","0","1,","Default,","0","Nutshell Handbooks","414","","27,95","0","","","","Paperback","0","","","For people who create and modify text files, <i>sed</i> and <i>awk</i> are power tools for editing. Most of the things that you can do with these programs can be done interactively with a text editor. However, using <i>sed</i> and <i>awk</i> can save many hours of repetitive work in achieving the same result.<br /><br />To master <i>sed</i> and <i>awk</i> you must thoroughly understand UNIX regular expressions, and understand the syntax of <i>sed</i> and <i>awk</i> commands. This handbook treats regular expressions as a foundation for learning about <i>sed</i> and <i>awk</i> and contains a comprehensive treatment of <i>sed</i> and <i>awk</i> syntax. It emphasizes the kinds of practical problems that <i>sed</i> and <i>awk</i> can help users to solve, with many useful example scripts and programs.<br /><br />Contents include:<br /><br /><br />A tutorial showing basic operations of <i>sed</i> and <i>awk</i><br />Regular expression syntax and examples Basic and advanced <i>sed</i> commands Features of <i>awk</i> (plus <i>gawk</i> and <i>nawk</i>) Common programming constructs Advanced topics User-contributed scripts","","English","2017-02-18 09:41:15","0","0000-00-00","2017-02-18 09:41:15","5150d853d77d59211ae5604fa92913eb",
+"39","Berglin, Jan|Berglin, Maria","Det sista rotavdraget","9789146226765","Wahlström & Widstrand","2015-08-06","0","1,","Default,","0","","132","","","0","","","","Paperback","0","","","Jan och Maria Berglins träffsäkra 25:e album är här. Det är så mycket man inte hinner med. Vetenskapen går framåt, samtidigt som ekonomin går bakåt. Nya regler och lagar införs som man inte har riktigt koll på. Får man verkligen inte göra ett rotavdrag hos tandläkaren? Det heter ju avdrag för ""reparation och underhåll samt om- och tillbyggnad"".<br /><br />Många undrar också om det allra sista rotavdraget man får göra, är för själva gravsättningen. Finns det någon som ser till att man får göra alla avdrag man har rätt till efter döden?<br /><br />Ja, för alla er som har liknande frågor, finns nu ett alldeles nytt material att tillgå. 'Det sista rotavdraget' är en pedagogisk seriebok med fylligt innehåll och många intressanta observationer. Den kanske inte ger några enkla svar, men den ställer heller inga enkla frågor.","","Swedish","2017-02-18 09:41:32","0","0000-00-00","2017-02-18 09:41:32","b96d560736694d850721ea245e7f7d5b",
+"40","Loeliger, Jon","Version Control with Git","9780596520120","O'Reilly Media","2009-06-11","0","1,","Default,","0","","297","","34,99","0","","","","Paperback","0","","","<i>Version Control with Git</i> takes you step-by-step through ways to track, merge, and manage software projects, using this highly flexible, open source version control system.<br /><br /> Git permits virtually an infinite variety of methods for development and collaboration. Created by Linus Torvalds to manage development of the Linux kernel, it's become the principal tool for distributed version control. But Git's flexibility also means that some users don't understand how to use it to their best advantage. <i>Version Control with Git</i> offers tutorials on the most effective ways to use it, as well as friendly yet rigorous advice to help you navigate Git's many functions.<br /><br /> With this book, you will:<br /><br /><br /><br /><br />Learn how to use Git in several real-world development environments Gain insight into Git's common-use cases, initial tasks, and basic functions Understand how to use Git for both centralized and distributed version control Use Git to manage patches, diffs, merges, and conflicts Acquire advanced techniques such as rebasing, hooks, and ways to handle submodules (subprojects) Learn how to use Git with Subversion Git has earned the respect of developers around the world. Find out how you can benefit from this amazing tool with <i>Version Control with Git</i>.","Computers / Utilities","English","2017-02-18 09:41:46","0","0000-00-00","2017-02-18 09:41:46","a99ad9134d2a2245275eb1e716839b17",
+"41","Tate, Bruce A.|Tate, Bruce","Seven Languages in Seven Weeks","9781934356593","Pragmatic Bookshelf","2010-11-17","0","1,","Default,","0","Pragmatic Programmers","328","","34,95","0","","","","Paperback","0","","","You should learn a programming language every year, as recommended by <i>The Pragmatic Programmer</i>. But if one per year is good, how about <i>Seven Languages in Seven Weeks</i>? In this book you'll get a hands-on tour of Clojure, Haskell, Io, Prolog, Scala, Erlang, and Ruby. Whether or not your favorite language is on that list, you'll broaden your perspective of programming by examining these languages side-by-side. You'll learn something new from each, and best of all, you'll learn how to learn a language quickly.<br /><br /> Ruby, Io, Prolog, Scala, Erlang, Clojure, Haskell. With <i>Seven Languages in Seven Weeks,</i> by Bruce A. Tate, you'll go beyond the syntax-and beyond the 20-minute tutorial you'll find someplace online. This book has an audacious goal: to present a meaningful exploration of seven languages within a single book. Rather than serve as a complete reference or installation guide, <i>Seven Languages</i> hits what's essential and unique about each language. Moreover, this approach will help teach you how to grok new languages.<br /><br /> For each language, you'll solve a nontrivial problem, using techniques that show off the language's most important features. As the book proceeds, you'll discover the strengths and weaknesses of the languages, while dissecting the process of learning languages quickly--for example, finding the typing and programming models, decision structures, and how you interact with them.<br /><br /> Among this group of seven, you'll explore the most critical programming models of our time. Learn the dynamic typing that makes Ruby, Python, and Perl so flexible and compelling. Understand the underlying prototype system that's at the heart of JavaScript. See how pattern matching in Prolog shaped the development of Scala and Erlang. Discover how pure functional programming in Haskell is different from the Lisp family of languages, including Clojure.<br /><br /> Explore the concurrency techniques that are quickly becoming the backbone of a new generation of Internet applications. Find out how to use Erlang's let-it-crash philosophy for building fault-tolerant systems. Understand the actor model that drives concurrency design in Io and Scala. Learn how Clojure uses versioning to solve some of the most difficult concurrency problems.<br /><br /> It's all here, all in one place. Use the concepts from one language to find creative solutions in another-or discover a language that may become one of your favorites.","Computers / Software Development & Engineering / General","English","2017-02-18 09:42:08","0","0000-00-00","2017-02-18 09:42:08","bd38ac67a77205ecdf4ed2c6285acbb7",
+"42","Vaughan, Gary V.|Vaughn, Gary V.|Elliston, Ben|Tromey, Tom|Taylor, Ian Lance","GNU Autoconf, Automake, and Libtool","1578701902","Sams","2000-10-16","0","1,","Default,","0","","432","","40,00","0","","","","Paperback","0","","","This is the first book focused on the three key Open Source development tools written by the maintainers of the tools. The authors teach developers how to boost their productivity and the portability of their applications using GNU autoconf, GNU automake, and GNU libtool. This is a unique book that will appeal to application developers working across multiple platforms.","","English","2017-02-18 09:43:39","0","0000-00-00","2017-02-18 09:43:39","b1f0582510bc748b8b3485cc72937b0d",
+"43","Ekendahl, Staffan","Amerikanerna: Sådana Är De, Så Tänker De","9789170012419","Månpocket","2005-03-24","0","1,","Default,","0","","273","","","0","","","","Paperback","0","","","Varför är amerikaner så olika oss européer? <br /><br />Att vi européer är väl bevandrade inom amerikansk populärkultur betyder inte att vi också är bekanta med det amerikanska samhället och dess värderingar. Det finns inslag i den amerikanska vardagen som aldrig syns utanför landets gränser. Vad är egentligen anledningen till den amerikanska vapenkulturen, dödsstraffet och den militära makten? Vilken är bakgrunden till rasismen, abortmotståndet, klassklyftor och religionens starka inflytande? Vilka amerikanska hjältar har amerikanerna själva? Varför ""hatar"" amerikanerna politik? Och varför spelar de fotboll med händerna? <br /><br />Journalisten Staffan Ekendahl ger en spännande och lärorik beskrivning av USA och den amerikanska kulturen. Han växlar mellan stort och smått, och blandar traditionella reportage med insiktsfulla analyser och egna minnesbilder från sina år i världens mäktigaste land.","","Swedish","2017-02-18 09:44:05","0","0000-00-00","2017-02-18 09:44:05","5ac7f1eb5e55a8c0718deb05928cb436",
+"44","Cussler, Clive|Cussler, Dirk","Black Wind","9780141020686","Penguin Books","2005-10-27","0","1,","Default,","0","Dirk Pitt (18)","688","","11,25","0","","","","Paperback","0","","","In the waning days of World War II, the Japanese tried a last desperate measure a different kind of kamikaze mission, this one carried out by two submarines bound for the west coast of the United States, their cargo a revolutionary new strain of biological virus. Neither sub made it to the designated target. But that does not mean they were lost. might be, and has an extraordinary plan in for the prize inside a plan that could reshape the world as we know it. All that stands in the way are three people: a marine biologist named Summer, a marine engineer named Dirk, and their father, Dirk Pitt, the new head of NUMA. children to track them down. But never has he looked upon the face of pure evil until now. at the height of his storytelling powers.","","English","2017-02-18 09:44:18","0","0000-00-00","2017-02-18 09:44:18","0575188650bd37cae113960ab971ecd3",
+"45","Lovecraft, H.P.|Fitzer, Denise L.|Lovecraft, H. P.","Waking Up Screaming: Haunting Tales of Terror","9780345458292","Del Rey","2003-01-01","0","1,","Default,","0","","370","","7,99","0","","","","Paperback","0","","","<b>“The oldest and strongest emotion of mankind is fear, and the oldest and strongest kind of fear is fear of the unknown.”<br />–H. P. LOVECRAFT<i><br /></i></b><br />Welcome to the world of H. P. Lovecraft, the undisputed master of terror. His work has inspired countless nightmares, and this collection of some of his most chilling stories is likely to inspire even more.<br /><br /><b>Cool Air</b>–An icy apartment hides secrets no man dares unlock.<br /><b>The Case of Charles Dexter Ward</b>–Ward delves into the black arts and resurrects the darkest evil from beyond the grave.<br /><b>The Terrible Old Man</b>–The intruders seek a fortune but find only death. <br /><b>Herbert West–Reanimator</b>–Mad experiments yield hideous results in this bloodcurdling tale, the inspiration for the cult film <i>Re-Animator</i>.<br /><b>The Shadow Over Innsmouth</b>–A small fishing town’s population is obscenely corrupted by a race of fiendish undersea creatures.<br /><b>The Lurking Fear</b>–An upstate New York clan degenerates into thunder-crazed mole like creatures with a taste for human flesh.<br /><br /><b>PLUS TEN OTHER SPINE-TINGLING TALES<br /></b>","Fiction / Short Stories (single author)","English","2017-02-18 09:44:38","0","0000-00-00","2017-02-18 09:44:38","e40d650b83b9b2d939b3598707e81dc9",
+"46","Anonymous, |Burton, Richard Francis|Burton, Sir Richard Francis|Burton, Richard F.","Arabian Nights","9780007420100","HarperCollins","2011-01-01","0","1,","Default,","0","هزار و یک شب، نشر مرکز، طبقه‌ بندی شب به شب|هزار و یک شب (دوره چهارجلدی) - انتشارات نیلوفر (1)|One Thousand and One Arabian Nights (16 vol. ver.)|Collins Classics","415","","","0","","","","Paperback","0","","","<i>'For,' said he, 'there never was nor is there one chaste woman upon the face of earth.'</i><br /><br />A newlywed Arabian queen avoids execution by keeping her mistrusting king entertained with her stories. By never finishing a story on the night she begins telling is the keeps him on tenterhooks and by the time she has run out of tales, the king has learnt to love and trust her, so her life is spared. Sir Richard Burton's translation of <i>Arabian Nights</i> is the most well-known and complete collection of these 9th-century Arabic tales of tragedy, love, erotica, comedy and fable.","","English","2017-02-18 09:45:22","0","0000-00-00","2017-02-18 09:45:22","6061250d6f44e434ad87e319a7fd1648",
+"47","Harden, Blaine","Flykten från läger 14: Den dramatiska rymningen från ett nordkoreanskt fångläger","9789187319563","Pocketförlaget","2013-10-21","0","1,","Default,","0","","243","","","0","","","","Paperback","0","","","Shin Dong-huyk föddes i arbetslägret 1982 och kände inte till något annat än den värld som fanns innanför det höga elstängslet där han växte upp. I tjugo år präglades hans liv av svält tortyr och angiveri ett upphittat riskorn kunde leda till en kamp på liv och död. Shin levde långt under varje form av mänsklig värdighet, ända till den dag då han lyckades fly och fann en helt ny värld, på andra sidan taggtråden.","","Swedish","2017-02-18 09:45:35","0","0000-00-00","2017-02-18 09:45:35","81bae4e718a0594d83b92578a5068978",
+"48","Enoksen, Lars Magnar","Runor: Historia, Tydning, Tolkning","9789189442559","Historiska Media","2002","0","1,","Default,","0","","240","","","0","","","","Paperback","0","","","","","Swedish","2017-02-18 09:45:47","0","0000-00-00","2017-02-18 09:45:47","7244b760ecb00e38eac903f217ced805",
+"49","Jacquemot, Nicolas","Handbok i konsten att vara social","9789146215967","Wahlström & Widstrand","2007-02-23","0","1,","Default,","0","","220","","","0","","","","Paperback","0","","","","","Swedish","2017-02-18 09:46:09","0","0000-00-00","2017-02-18 09:46:09","6f7fee45581e2b079ccbecdce57e0346",
+"50","Erikson, Steven","Deadhouse Gates","9780553813111","Bantam Press","2001-11-27","0","1,","Default,","0","The Malazan Book of the Fallen (2)|Malazan (6)|Malazańska Księga Poległych (2)|La caduta di Malazan (2)|Malazan Book of the Fallen (2)","960","","","0","","","","Mass Market Paperback","0","","","In the Holy Desert Raraku, the seer Sha'ik and her followers prepare for the long-prophesied uprising named the Whirlwind. Enslaved in the Otataral mines, Felisin, youngest scion of the disgraced House of Paran, dreams of freedom and vows revenge, while the outlawed Brigdburners Fiddler and Kalam conspire to rid the world of Empress Laseen (although it seems the gods would, as always have it otherwise). And as two ancient warriors - bearers of a devastating secret - enter this blighted land, so an untried commander of the Malaz 7th Army leads his war-weary troops in a last, valiant running battle to save the lives of thirty thousand refugees.<br /><br />In this thrilling chapter in the epic story of the Malazan Empire, war and betrayal, intrigue and roiling magic collide, shaping destinies and giving birth to legends...","","English","2017-02-18 09:46:21","0","0000-00-00","2017-02-18 09:46:21","bc339519c4c8447047377aac053f779b",
+"51","Persson, Arne|Böiers, Lars-Christer","Analys i en variabel","9789144067650","Studentlitteratur","2010-08-16","0","1,","Default,","0","","523","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 09:46:41","0","0000-00-00","2017-02-18 09:46:41","9fd6b94c208905782e2b719cea71d39f",
+"52","Lindell, Martin","8 bitar på 80-talet: Nintendos marsch in i de svenska hemmen","9789163345586","Vulkan","2013-04-30","0","1,","Default,","0","","90","","","0","","","","Paperback","0","","","Nintendo har sedan tidigt 80-tal haft en stark position i Sverige. En hel generation tv-spelare växte upp med NES - Nintendo Entertainment System, även i folkmun kallad Nintendo 8-bitars. Odödliga spelklassiker som Super Mario Bros och The Legend of Zelda såg dagens ljus på NES. En kombination av dessa unika spelidéer samt ett flitigt och finurligt arbete av den svenska generalagenten Bergsala ledde till stor framgång i Sverige. NES har än idag ett starkt följe och präglar dagens spelkultur. Denna bok berättar historien bakom succén från Bergsalas tidiga möten med Nintendo i Japan till det bittra 90-talet när valutan devalverades och hårda år drabbade Nintendo. Minnen från bl.a. Owe Bergsten och Lars Jarhamn återberättas.","","Swedish","2017-02-18 09:47:11","0","0000-00-00","2017-02-18 09:47:11","ff81c61965a11bfa8ee43ee3e1c5c037",
+"53","Oram, Andy|Wilson, Greg|Bentley, Jon L.|Kernighan, Brian W.|Petzold, Charles|Crockford, Douglas|Jr., Henry S. Warren|Gulhati, Ashish|Stein, Lincoln|Kent, Jim|Dongarra, Jack|Luszczek, Poitr|Kolawa, Adam|Kroah-Hartman, Greg|Spinellis, Diomidis|Kuchling, Andrew|Oliphant, Travis E.|Mak, Ronald|de Carvalho, Rogério Atem|Monnerat, Rafael|Cantrill, Bryan|Dean, Jeffrey|Ghemawat, Sanjay|Jones, Simon Peyton|Dybuig, R. Kent|Otte, William R.|Schmidt, Douglas C.|Patzer, Andrew|Fogel, Karl|Bray, Tim|Harold, Eliotte Rusty|Feathers, Michael C.|Savoia, Alberto","Beautiful Code: Leading Programmers Explain How They Think","9780596510046","O'Reilly Media","2007-07-03","0","1,","Default,","0","O'Reilly)","563","","44,99","0","","","","Paperback","0","","","How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.<br /><br />This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. <i>Beautiful Code</i> is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.","","English","2017-02-18 09:48:38","0","0000-00-00","2017-02-18 09:48:38","da516ecab4462ded42745054da87da4b",
+"54","Skiena, Steven S|Revilla, Miguel A.|Skiena, Steven S.","Programming Challenges: The Programming Contest Training Manual","9780387001630","Springer","2008-10-10","0","1,","Default,","0","Texts in Computer Science","364","","69,95","0","","","","Paperback","0","","","There are many distinct pleasures associated with computer programming. Craftsm- ship has its quiet rewards, the satisfaction that comes from building a useful object and making it work. Excitement arrives with the ?ash of insight that cracks a previously intractable problem. The spiritual quest for elegance can turn the hacker into an artist. Therearepleasuresinparsimony,insqueezingthelastdropofperformanceoutofclever algorithms and tight coding. Thegames,puzzles,andchallengesofproblemsfrominternationalprogrammingc- petitionsareagreatwaytoexperiencethesepleasureswhileimprovingyouralgorithmic and coding skills. This book contains over 100 problems that have appeared in previous programming contests, along with discussions of the theory and ideas necessary to - tack them. Instant online grading for all of these problems is available from two WWW robot judging sites. Combining this book with a judge gives an exciting new way to challenge and improve your programming skills. This book can be used for self-study, for teaching innovative courses in algorithms and programming, and in training for international competition. To the Reader Theproblemsinthisbookhavebeenselectedfromover1,000programmingproblemsat the Universidad de Valladolid online judge, available athttp://online-judge.uva.es.The judgehasruledonwelloveronemillionsubmissionsfrom27,000registeredusersaround the world to date. We have taken only the best of the best, the most fun, exciting, and interesting problems available.","Computers / Virtual Worlds","English","2017-02-18 09:48:51","0","0000-00-00","2017-02-18 09:48:51","b99ff0f68b55dd7fa5c4cab775d1bbfd",
+"55","Krevisky, Joseph|Linfield, Jordan L.","Bad Spellers Dictionary, The","9780394491998","Random House Reference","1995-08-22","0","1,","Default,","0","","186","","5,00","0","","","","Hardcover","0","","","Vest pocket","","English","2017-02-18 09:49:05","0","0000-00-00","2017-02-18 09:49:05","bcb190a7bbaf892c8d6567f4d26b2b65",
+"56","Krug, Steve","Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability","9780321965516","New Riders Publishing","2014-01-03","0","1,","Default,","0","Voices That Matter","200","","45,00","0","","","","Paperback","0","","","Since Don’t Make Me Think was first published in 2000, over 400,000 Web designers and developers have relied on Steve Krug’s guide to help them understand the principles of intuitive navigation and information design.<br /><br />In this 3rd edition, Steve returns with fresh perspective to reexamine the principles that made Don’t Make Me Think a classic-–with updated examples and a new chapter on mobile usability. And it’s still short, profusely illustrated…and best of all–fun to read.<br /><br />If you’ve read it before, you’ll rediscover what made Don’t Make Me Think so essential to Web designers and developers around the world. If you’ve never read it, you’ll see why so many people have said it should be required reading for anyone working on Web sites.","Computers / User Interfaces","English","2017-02-18 09:49:15","0","0000-00-00","2017-02-18 09:49:15","6460f91ac325e1c49d1f192e82bbdbc1",
+"57","Emerick, Chas|Carper, Brian|Grand, Christophe","Clojure Programming","9781449394707","O'Reilly Media","2012-04-19","0","1,","Default,","0","","630","","49,99","0","","","","Paperback","0","","","The Clojure language is a practical alternative for everyday programming that offers expressivity rivaling other dynamic languages like Ruby and Python, but allows you to seamlessly take advantage of Java libraries, services, and all of the resources of the JVM ecosystem. This book helps you learn the fundamentals of Clojure with examples relating it to the languages you know already, in the domains and topics you work with every day. See how this JVM language can help eliminate unnecessary complexity from your programming practice and open up new options for solving the most challenging problems.<br /><i>Clojure Programming</i> demonstrates the language's flexibility by showing how it can be used for common tasks like web programming and working with databases, up through more demanding applications that require safe, effective concurrency and parallelism, data and statistical analysis, and more. This in-depth look helps tie together the full Clojure development experience, from how to organize your project and an introduction to Clojure build tooling, to a tutorial on how to make the most of Clojure’s REPL during development, and how to deploy your finished application in a cloud environment.<br /><br />Learn how to use Clojure without losing your investment in the Java platform <br />Understand the advantages of Clojure as an efficient Lisp for the JVM <br />See how Clojure is used today in several practical domains <br />Discover how Clojure eliminates the need for many verbose and complicated design patterns <br />Deploy large web applications across tens or hundreds of cloud nodes with Clojure","Computers / Programming Languages / Java","English","2017-02-18 09:49:24","0","0000-00-00","2017-02-18 09:49:24","10ea9c0ac831dc668922c17a43164cb7",
+"58","Barski, Conrad","Land of Lisp: Learn to Program in Lisp, One Game at a Time!","9781593272814","No Starch Press","2010-11-12","0","1,","Default,","0","","504","","49,95","0","","","","Paperback","0","","","Lisp has been hailed as the world's most powerful programming language, but its cryptic syntax and academic reputation can be enough to scare off even experienced programmers. Those dark days are finally over—<i>Land of Lisp</i> brings the power of functional programming to the people!<br /><br />With his brilliantly quirky comics and out-of-this-world games, longtime Lisper Conrad Barski teaches you the mysteries of Common Lisp. You'll start with the basics, like list manipulation, I/O, and recursion, then move on to more complex topics like macros, higher order programming, and domain-specific languages. Then, when your brain overheats, you can kick back with an action-packed comic book interlude!<br /><br />Along the way you'll create (and play) games like Wizard Adventure, a text adventure with a whiskey-soaked twist, and Grand Theft Wumpus, the most violent version of Hunt the Wumpus the world has ever seen.<br /><br />You'll learn to:<br /><br /><br />Master the quirks of Lisp's syntax and semantics Write concise and elegant functional programs Use macros, create domain-specific languages, and learn other advanced Lisp techniques Create your own web server, and use it to play browser-based games Put your Lisp skills to the test by writing brain-melting games like Dice of Doom and Orc Battle With <i>Land of Lisp</i>, the power of functional programming is yours to wield.","GAMES / Video & Electronic","English","2017-02-18 09:50:15","0","0000-00-00","2017-02-18 09:50:15","1ba0cfd6f64ca501091ec2039a46b93b",
+"59","Vliet, Vrije Van|Vliet, Hans van","Software Engineering: Principles And Practice","9780471936114","Wiley","1993-05-10","0","1,","Default,","0","","578","","69,99","0","","","","Hardcover","0","","","Topics range from the technically challenging formal specifications to managerial issues such as quality and team organization to HCI aspects. The author's approach to the material and organization of the chapters is based on years of teaching experience of the software life cycle itself and all the satellite subjects which make up the practice of developing and working on large scale software projects. As developing software becomes ever increasingly complicated, the practices adjust accordingly. The references given and pointers for further reading are comprehensive.","","English","2017-02-18 09:50:31","0","0000-00-00","2017-02-18 09:50:31","ac2a5e004fc49f74f88767fa40f1cc78",
+"60","Glad, Torkel|Ljung, Lennart","Reglerteknik - Grundläggande teori","9789144022758","Studentlitteratur","2006-10-20","0","1,","Default,","0","","244","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 09:51:15","0","0000-00-00","2017-02-18 09:51:15","6823bd06aa1aba91e9fa6d33533c6025",
+"61","Forsling, Göran|Neymark, Mats","Matematisk analys En variabel","9789147100231","Liber","2011-08-03","0","1,","Default,","0","","600","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 09:51:31","0","0000-00-00","2017-02-18 09:51:31","ce1df40c0d821d06ac9bb21fb375f0f6",
+"62","McKusick, Marshall Kirk|Neville-Neil, George|Watson, Robert|Neville-Neil, George V.|Watson, Robert N.M.|Watson, Robert N. M.","Design and Implementation of the FreeBSD Operating System, The","9780321968975","Addison-Wesley Professional","2014-09-15","0","1,","Default,","0","2nd Edition","928","","69,99","0","","","","Hardcover","0","","","The most complete, authoritative technical guide to the FreeBSD kernel's internal structure has now been extensively updated to cover all major improvements between Versions 5 and 11. Approximately one-third of this edition's content is completely new, and another one-third has been extensively rewritten. Three long-time FreeBSD project leaders begin with a concise overview of the FreeBSD kernel's current design and implementation. Next, they cover the FreeBSD kernel from the system-call level down-from the interface to the kernel to the hardware. Explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing each significant system facility, including process management, security, virtual memory, the I/O system, filesystems, socket IPC, and networking. This Second Edition - Explains highly scalable and lightweight virtualization using FreeBSD jails, and virtual-machine acceleration with Xen and Virtio device paravirtualization - Describes new security features such as Capsicum sandboxing and GELI cryptographic disk protection - Fully covers NFSv4 and Open Solaris ZFS support - Introduces FreeBSD's enhanced volume management and new journaled soft updates - Explains DTrace's fine-grained process debugging/profiling - Reflects major improvements to networking, wireless, and USB support Readers can use this guide as both a working reference and an in-depth study of a leading contemporary, portable, open source operating system. Technical and sales support professionals will discover both FreeBSD's capabilities and its limitations. Applications developers will learn how to effectively and efficiently interface with it; system administrators will learn how to maintain, tune, and configure it; and systems programmers will learn how to extend, enhance, and interface with it. Marshall Kirk McKusick writes, consults, and teaches classes on UNIX- and BSD-related subjects. While at the University of California, Berkeley, he implemented the 4.2BSD fast filesystem. He was research computer scientist at the Berkeley Computer Systems Research Group (CSRG), overseeing development and release of 4.3BSD and 4.4BSD. He is a FreeBSD Foundation board member and a long-time FreeBSD committer. Twice president of the Usenix Association, he is also a member of ACM, IEEE, and AAAS. George V. Neville-Neil hacks, writes, teaches, and consults on security, networking, and operating systems. A FreeBSD Foundation board member, he served on the FreeBSD Core Team for four years. Since 2004, he has written the ""Kode Vicious"" column for ""Queue"" and ""Communications of the ACM."" He is vice chair of ACM's Practitioner Board and a member of Usenix Association, ACM, IEEE, and AAAS. Robert N.M. Watson is a University Lecturer in systems, security, and architecture in the Security Research Group at the University of Cambridge Computer Laboratory. He supervises advanced research in computer architecture, compilers, program analysis, operating systems, networking, and security. A FreeBSD Foundation board member, he served on the Core Team for ten years and has been a committer for fifteen years. He is a member of Usenix Association and ACM.","Computers / Operating Systems / UNIX","English","2017-02-18 09:51:52","0","0000-00-00","2017-02-18 09:51:52","175752a7ac0c81f24138b332b01c2ca9",
+"63","Nishigaki, Hiroyuki","How to Good-Bye Depression: If You Constrict Anus 100 Times Everyday. Malarkey? or Effective Way?","9780595094721","Writer's Showcase Press","2000-08-20","0","1,","Default,","0","","252","","16,95","0","","","","Paperback","0","","","I think constricting anus 100 times and denting navel 100 times in succession everyday is effective to good-bye depression and take back youth. You can do so at a boring meeting or in a subway. I have known a 70-year-old man who has practiced it for 20 years. As a result, he has a good complexion and has grown 20 years younger. His eyes sparkle. He is full of vigor, happiness and joy. He has neither complained nor born a grudge under any circumstance. Furthermore, he can make #### three times in succession without drawing out. <p>In addition, he also can have burned a strong, beautiful fire within his abdomen. It can burn out the dirty stickiness of his body, release his immaterial fiber or third attention, which has been confined to his stickiness. Then, he can shoot out his immaterial fiber or third attention to an object, concentrate on it and attain happy lucky feeling through the success of concentration. </p><p> If you don't know concentration, which gives you peculiar pleasure, your life looks like hell. </p><p></p>","Self-Help / Mood Disorders / Depression","English","2017-02-18 09:52:02","0","0000-00-00","2017-02-18 09:52:02","3eac6b3ec8193fecd070d2cf60104189",
+"64","Meyer, Eric A.","CSS: The Definitive Guide","9780596527334","O'Reilly Media","2000-05-08","0","1,","Default,","0","","538","","44,99","0","","","","Paperback","0","","","<em>CSS: The Definitive Guide, 3rd Edition</em>, provides you with a comprehensive guide to CSS implementation, along with a thorough review of all aspects of CSS 2.1. Updated to cover Internet Explorer 7, Microsoft's vastly improved browser, this new edition includes content on positioning, lists and generated content, table layout, user interface, paged media, and more. <p>Simply put, Cascading Style Sheets (CSS) is a way to separate a document's structure from its presentation. The benefits of this can be quite profound: CSS allows a much richer document appearance than HTML and also saves time--you can create or change the appearance of an entire document in just one place; and its compact file size makes web pages load quickly.</p> <p>Author Eric Meyer tackles the subject with passion, exploring in detail each individual CSS property and how it interacts with other properties. You'll not only learn how to avoid common mistakes in interpretation, you also will benefit from the depth and breadth of his experience and his clear and honest style. This is the complete sourcebook on CSS.</p> <p>The 3rd edition contains: <br /></p> <ul> <li>Updates to reflect changes in the latest draft version of CSS 2.1</li> <li>Browser notes updated to reflect changes between IE6 and IE7</li> <li>Advanced selectors supported in IE7 and other major browsers included <br /></li> <li>A new round of technical edits by a fresh set of editors</li> <li>Clarifications and corrected errata, including updated URLs of referenced online resources</li> </ul>","","English","2017-02-18 09:52:23","0","0000-00-00","2017-02-18 09:52:23","fd99dd6f68b44f12109b1f4e972f703e",
+"65","Flanagan, David","Java in a Nutshell: A Desktop Quick Reference for Java Programmers","9781565921832","O'Reilly Media","1996-03-08","0","1,","Default,","0","Nutshell Handbooks","460","","19,95","0","","","","Paperback","0","","","<i>Java in a Nutshell</i> is a complete quick-reference guide to Java, the hot new programming language from Sun Microsystems. This comprehensive volume contains descriptions of all of the classes in the Java 1.0 API, with a definitive listing of all methods and variables. It also contains an accelerated introduction to Java for C and C++ programmers who want to learn the language <i>fast</i>.<br /><br /><i>Java in a Nutshell</i> introduces the Java programming language and contains many practical examples that show programmers how to write Java applications and applets. It is also an indispensable quick reference designed to wait faithfully by the side of every Java programmer's keyboard. It puts all the information Java programmers need right at their fingertips.<br /><br />Contents include:<br /><br /><br />An advanced introduction to Java. The first three chapters will teach C and C++ programmers everything they need to know to start programming with Java right away. Practical, real-world examples that show programmers how to write applets; implement smooth animation; create graphical user interfaces; write client and server programs that communicate over the network; use threads; and more A compact reference to the 211 classes, 1828 methods and 235 variables in the Java 1.0 API Descriptions of each class A Java keyword and concept glossary Quick-reference tables of operators, primitives, escape characters, visibility modifiers, doc comment syntax, events, keysyms, fonts, colors, cursors, system properties, Unicode and Java-related HTML syntax Documentation for the Java compiler, interpreter, and other tools in the Java Developer's Kit","","English","2017-02-18 09:52:35","0","0000-00-00","2017-02-18 09:52:35","5a6300e04671728b42527498647d1f0c",
+"66","Skiena, Steven S.|Skiena, Steve S.","Algorithm Design Manual, The","9780387948607","Springer","1997-11-14","0","1,","Default,","0","","486","","89,95","0","","","","Hardcover","0","","","This volume helps take some of the ""mystery"" out of identifying and dealing with key algorithms. Drawing heavily on the author's own real-world experiences, the book stresses design and analysis. Coverage is divided into two parts, the first being a general guide to techniques for the design and analysis of computer algorithms. The second is a reference section, which includes a catalog of the 75 most important algorithmic problems. By browsing this catalog, readers can quickly identify what the problem they have encountered is called, what is known about it, and how they should proceed if they need to solve it. This book is ideal for the working professional who uses algorithms on a daily basis and has need for a handy reference. This work can also readily be used in an upper-division course or as a student reference guide. THE ALGORITHM DESIGN MANUAL comes with a CD-ROM that contains: * a complete hypertext version of the full printed book. * the source code and URLs for all cited implementations. * over 30 hours of audio lectures on the design and analysis of algorithms are provided, all keyed to on-line lecture notes.","Computers / Programming / General","English","2017-02-18 09:52:54","0","0000-00-00","2017-02-18 09:52:54","d9bb1175def01f88c6a671c8a06516ea",
+"67","Sverige, Standardiseringskommissionen i","Dataordboken: Databehandling-ordlista Sv-E-F-D","9171621717","StandardiseringsKommissionen i Sverige","1984","0","1,","Default,","0","Svensk standard","187","","","0","","","","Unknown Binding","0","","","","","","2017-02-18 09:54:38","0","0000-00-00","2017-02-18 09:54:38","42d7b804c052700707c03ca1f3c9d5e7",
+"68","Stephenson, Neal","Quicksilver","9780060593087","Harper Perennial","2003-09-23","0","1,","Default,","0","The Baroque Cycle (1)","927","","18,99","0","","","","Paperback","0","","","<i>Quicksilver</i> is the story of Daniel Waterhouse, fearless thinker and conflicted Puritan, pursuing knowledge in the company of the greatest minds of Baroque-era Europe, in a chaotic world where reason wars with the bloody ambitions of the mighty, and where catastrophe, natural or otherwise, can alter the political landscape overnight.<br /><br />It is a chronicle of the breathtaking exploits of ""Half-Cocked Jack"" Shaftoe--London street urchin turned swashbuckling adventurer and legendary King of the Vagabonds--risking life and limb for fortune and love while slowly maddening from the pox.<br /><br />And it is the tale of Eliza, rescued by Jack from a Turkish harem to become spy, confidante, and pawn of royals in order to reinvent Europe through the newborn power of finance.<br /><br />A gloriously rich, entertaining, and endlessly inventive novel that brings a remarkable age and its momentous events to vivid life, <i>Quicksilver</i> is an extraordinary achievement from one of the most original and important literary talents of our time.<br /><br />This P.S. edition includes 16 pages of supplementary materials.<br /><br />Cover design by Richard L. Aquan<br />Cover illustration from the Mary Evans Picture Library; painting of Great Fire of London on stepback","","English","2017-02-18 09:55:00","0","0000-00-00","2017-02-18 09:55:00","7e76a79b9b6aa46a174876532ed233a5",
+"69","Hellmark, Christer","Typografisk handbok","9789173244459","Falkenberg","1996","0","1,","Default,","0","","140","","","0","","","","","0","","","","","","2017-02-18 09:55:52","0","0000-00-00","2017-02-18 09:55:52","3b51acbfb67dd697fad78d821eb4c4b2",
+"70","Williams, Sam","Free as in Freedom: Richard Stallman's Crusade for Free Software","0596002874","O'Reilly Media","2002-03-08","0","1,","Default,","0","","240","","22,95","0","","","","Paperback","0","","","<i>Free as in Freedom</i> interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success.<br /><br /><i>Free as in Freedom</i> examines one man's 20-year attempt to codify and communicate the ethics of 1970s era ""hacking"" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? <i>Free as in Freedom</i> provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others.<br /><br />Finally, <i>Free as in Freedom</i> examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as ""computer,"" ""operating system"" and perhaps even ""software"" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'","Technology & Engineering / Social Aspects","English","2017-02-18 09:56:32","0","0000-00-00","2017-02-18 09:56:32","cc95436150a0767ea178c7005eb97666",
+"71","Martin, Robert C.","Clean Code: A Handbook of Agile Software Craftsmanship","9780132350884","Prentice Hall PTR","2008-08-11","0","1,","Default,","0","","434","","49,99","0","","","","Paperback","0","","","Even bad code can function. But if code isn t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn t have to be that way. <br />Noted software expert Robert C. Martin presents a revolutionary paradigm with <i> <b>Clean Code: A Handbook of Agile Software Craftsmanship</b> </i>. Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code on the fly into a book that will instill within you the values of a software craftsman and make you a better programmer but only if you work at it. <br />What kind of work will you be doing? You ll be reading code lots of code. And you will be challenged to think about what s right about that code, and what s wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft. <br /><i> <b>Clean Code</b> </i> is divided into three parts. The first describes the principles, patterns, and practices of writing clean code. The second part consists of several case studies of increasing complexity. Each case study is an exercise in cleaning up code of transforming a code base that has some problems into one that is sound and efficient. The third part is the payoff: a single chapter containing a list of heuristics and smells gathered while creating the case studies. The result is a knowledge base that describes the way we think when we write, read, and clean code. <br />Readers will come away from this book understanding<br /><br />How to tell the difference between good and bad code How to write good code and how to transform bad code into good code How to create good names, good functions, good objects, and good classes How to format code for maximum readability How to implement complete error handling without obscuring code logic How to unit test and practice test-driven development This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code. <br />""","Computers / Software Development & Engineering / General","English","2017-02-18 09:57:00","0","0000-00-00","2017-02-18 09:57:00","f205d5a691aae6c401cca7e978230ee4",
+"72","Weiss, Mark Allen","Data Structures and Algorithm Analysis","9780805390520","Benjamin-Cummings Publishing Company","1991-09-01","0","1,","Default,","0","","455","","50,50","0","","","","Hardcover","0","","","This revision of Weiss' best-seller provides a concise, complete and dynamic picture of many important data structures used in modern programming practice using Pascal. The new edition retains its focus on issues of performances and efficiency, with the emphasis on concepts rather than code.*Many new and innovative data structures have been added including Tries/patricia, k-d trees, min max heaps, red black trees and pairing heaps *Many diagrams and illustrations added to aid the reader's understanding of data structures","Computers / Programming / Algorithms","English","2017-02-18 09:57:15","0","0000-00-00","2017-02-18 09:57:15","4a3acb33c8f358873be74e10aa6fc38f",
+"73","Binstock, Andrew|Rex, John","Practical Algorithms for Programmers","9780201632088","Addison-Wesley Professional","1995-06-29","0","1,","Default,","0","","592","","39,99","0","","","","Paperback","0","","","This book focuses on practical, immediately usable code with extensive discussion of portability and implementation-specific details. The authors present the useful but rarely discussed algorithms for phonetic searches, date and time routines (to the year AD 1), B-trees and indexed files, data compression, arbitrary precision arithmetic, checksums and data validation, as well as the most comprehensive coverage available of search routines, sort algorithms, and data structures. Practical Algorithms for Programmers requires only a working knowledge of C and no math beyond basic algebra. The source code is ANSI-compliant and has been tested and run under UNIX and on compilers from Borland, Microsoft, and Watcom.","Computers / Programming / Algorithms","English","2017-02-18 09:57:30","0","0000-00-00","2017-02-18 09:57:30","a85b653a45b14257440b9398ef195ca4",
+"74","Anderson, Ross J.|Anderson, Ross","Security Engineering: A Guide to Building Dependable Distributed Systems","9780470068526","John Wiley & Sons","2008-04-01","0","1,","Default,","0","","1040","","85,00","0","","","","Hardcover","0","","","The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.","Computers / Security / General","English","2017-02-18 09:57:40","0","0000-00-00","2017-02-18 09:57:40","8e50ef8da2e52abf652b2797a6bf7d97",
+"75","Ferguson, Niels|Schneier, Bruce|Kohno, Tadayoshi","Cryptography Engineering: Design Principles and Practical Applications","9780470474242","Wiley Publishing","2010-03-08","0","1,","Default,","0","","353","","55,00","0","","","","Paperback","0","","","<b>The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.</b> Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.<br /><br />After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.<br /><br /><br />An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more <i>Cryptography Engineering</i> gets you up to speed in the ever-evolving field of cryptography.","","English","2017-02-18 09:57:54","0","0000-00-00","2017-02-18 09:57:54","972234022398e99477568bcc70a6e404",
+"76","Shiflett, Chris|Torkington, Nathan|Diaz, Tatiana","Essential PHP Security","9780596006563","O'Reilly Media","2005-01-01","0","1,","Default,","0","","130","","29,95","0","","","","Paperback","0","","","<div><p>Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.</p><p>Security is an issue that demands attention, given the growing frequency of attacks on web sites. <i>Essential PHP Security</i> explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.</p><p>In the much-needed (and highly-requested) <i>Essential PHP Security</i>, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.</p><p>Topics covered include:</p><ul><li>Preventing cross-site scripting (XSS) vulnerabilities</li><li>Protecting against SQL injection attacks</li><li>Complicating session hijacking attempts</li></ul><p>You are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.</p></div>","Computers / Web / Page Design","English","2017-02-18 09:58:04","0","0000-00-00","2017-02-18 09:58:04","ed8a926ab6f24e27ada23eccbcfe0a84",
+"77","Tyler, Chris","X Power Tools","9780596101954","O'Reilly Media","2007-12-27","0","1,","Default,","0","","272","","39,99","0","","","","Paperback","0","","","This book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. More people use the X Window System than ever before, but there are few books about X in print. <i>X Power Tools</i> fills that hole with the most practical and up-to-date information available.<br /><br /> Written in O'Reilly's popular Power Tools format, <i>X Power Tools</i> offers dozens of standalone articles, thoroughly cross-referenced, on useful tools and techniques for using X. This unique inside look at X gives Unix/Linux system administrators, owners of self-administered systems, and power users a lot of useful ways to harness the power of this system effectively. This book:<br /><br /><br /><br /><br />Offers a thorough grounding in X configuration and how the system works Provides the complete ins and outs of changing a desktop's behavior, such as fonts, keyboard settings, and remote security Includes articles on how to take advantage of X's ""network transparency"" -- its ability to display graphical applications on a remote machine Explores intriguing areas such as using multiple monitors, building kiosks, and accessibility Features discussions on X Window innovations and the future of the system<br /><i>X Power Tools</i> covers configuration and use of X, focusing on Linux but also including notes on other operating systems such as Solaris and FreeBSD. Each article in the book gives you insight into X; the entire book gives you a real grasp on this system and what you can do with it.<br /><br />","Computers / Software Development & Engineering / General","English","2017-02-18 09:58:15","0","0000-00-00","2017-02-18 09:58:15","40203662cf3e4cae7b6ad16d35f615d0",
+"78","Nielsen, Michael A.|Chuang, Isaac L.","Quantum Computation and Quantum Information","9780521635035","Cambridge University Press","2000-10-23","0","1,","Default,","0","Cambridge Series on Information and the Natural Sciences","700","","106,00","0","","","","Paperback","0","","","In this first comprehensive introduction to the main ideas and techniques of quantum computation and information, Michael Nielsen and Isaac Chuang ask the question: What are the ultimate physical limits to computation and communication? They detail such remarkable effects as fast quantum algorithms, quantum teleportation, quantum cryptography and quantum error correction. A wealth of accompanying figures and exercises illustrate and develop the material in more depth. They describe what a quantum computer is, how it can be used to solve problems faster than familiar ""classical"" computers, and the real-world implementation of quantum computers. Their book concludes with an explanation of how quantum states can be used to perform remarkable feats of communication, and of how it is possible to protect quantum states against the effects of noise.","Technology & Engineering / Electronics / General","English","2017-02-18 09:58:33","0","0000-00-00","2017-02-18 09:58:33","06aee8726bffc168b8f0977bf1a15bbd",
+"79","Fall, Kevin R.|Fall, Kevin|Stevens, W. Richard","TCP/IP Illustrated, Volume 1: The Protocols","9780321336316","Addison-Wesley Professional","2011-11-25","0","1,","Default,","0","Addison-Wesley Professional Computing Series","1017","","69,99","0","","","","Hardcover","0","","","For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable. <i> Vint Cerf, Internet pioneer </i> <b> <i> <b>TCP/IP Illustrated, Volume 1, Second Edition, </b> </i> </b>is a detailed and visual guide to today s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP s core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explainsInternet addressing in both IPv4 and IPv6 networks. Then, hewalksthrough TCP/IP s structure and function from the bottom up: from link layer protocols such as Ethernet and Wi-Fi through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.""","Computers / Networking / Network Protocols","English","2017-02-18 09:58:50","0","0000-00-00","2017-02-18 09:58:50","101b1e1e4926b2a75c67d0c50cc1e912",
+"80","Manber, Udi","Introduction to Algorithms: A Creative Approach","0201120372","Addison-Wesley Professional","1989-01-11","0","1,","Default,","0","","478","","164,40","0","","","","Paperback","0","","","This book emphasizes the creative aspects of algorithm design by examining steps used in the process of algorithms development. The heart of this creative process lies in an analogy between proving mathematical theorems by induction and designing combinatorial algorithms. The book contains hundreds of problems and examples. It is designed to enhance the reader's problem-solving abilities and understanding of the principles behind algorithm design.","Computers / Data Modeling & Design","English","2017-02-18 09:59:21","0","0000-00-00","2017-02-18 09:59:21","87de1476a869f86497c0d189f66d3a7b",
+"81","Blum, Richard","Postfix","9780672321146","Sams Publishing","2001-05-25","0","1,","Default,","0","","624","","54,99","0","","","","Paperback","0","","","This book will offer broad coverage to instruct both the large ISP and the small business network administrator on how to install and configure a full featured Internet email system with a minimum amount of expense. This is possible using the Linux Operating System which supplies all of the necessary server software, the Postfix email software package, and Public Domain client email software on the client PC's. This book also includes educational information that can be used by network administrators in using Postfix to connect an office email server to an ISP. The Postfix email software package is in widely used on the Internet without any books documenting how to install, configure, and operate the email server. This book will provide all the information needed to run Postfix effectively and efficiently.","Computers / Operating Systems / UNIX","English","2017-02-18 09:59:45","0","0000-00-00","2017-02-18 09:59:45","a9ef3b96e023200da11d15758e1bedd3",
+"82","Harel, David|Feldman, Yishai|Feldman, Yishai A.","Algorithmics: The Spirit of Computing","9780321117847","Addison Wesley Longman","2004-06-01","0","1,","Default,","0","3rd Edition","536","","77,40","0","","","","Paperback","0","","","Now updated in its third edition, this book concerns the concepts, ideas, methods, &amp; results fundamental to computer science. It is about the science of computing &amp; is aimed at the technically-orientated reader was well as the computer professional.","Computers / Programming / Algorithms","English","2017-02-18 10:00:07","0","0000-00-00","2017-02-18 10:00:07","fe9b1167807ee42c556584ef7e8ba135",
+"83","Williamson, David P.|Shmoys, David B.","Design of Approximation Algorithms, The","9780521195270","Cambridge University Press","2014-12-15","0","1,","Default,","0","","518","","67,00","0","","","","Hardcover","0","","","Discrete optimization problems are everywhere, from traditional operations research planning problems, such as scheduling, facility location, and network design; to computer science problems in databases; to advertising issues in viral marketing. Yet most such problems are NP-hard. Thus unless P = NP, there are no efficient algorithms to find optimal solutions to such problems. This book shows how to design approximation algorithms: efficient algorithms that find provably near-optimal solutions. The book is organized around central algorithmic techniques for designing approximation algorithms, including greedy and local search algorithms, dynamic programming, linear and semidefinite programming, and randomization. Each chapter in the first part of the book is devoted to a single algorithmic technique, which is then applied to several different problems. The second part revisits the techniques but offers more sophisticated treatments of them. The book also covers methods for proving that optimization problems are hard to approximate. Designed as a textbook for graduate-level algorithms courses, the book will also serve as a reference for researchers interested in the heuristic solution of discrete optimization problems.","","English","2017-02-18 10:00:18","0","0000-00-00","2017-02-18 10:00:18","4e9e364b7c56db0a055ac5e696a15636",
+"84","Akenine-Möller, Tomas|Haines, Eric|Hoffman, Naty","Real-Time Rendering","9781568811017","A K PETERS","1999-07-22","0","1,","Default,","0","","482","","49,95","0","","","","Hardcover","0","","","Realistically animated 3D computer graphics rendered in real time is a goal of the computer animation industry. Tomas M ller and Eric Haines provide a text that covers the development of real-time rendering for use in computer games, computer-animated movies, advertising, and other applications. The authors have written the book that they wish they had when they started out. Focusing on the entire graphics pipeline, this book covers optimization, visual appearance, speed-up techniques, and collision detection. The authors present new techniques and time-tested algorithms. Entire sections are devoted to special effects, polygon tessellation, and model simplification. A large section on hardware ends the book. Copious references, mathematical appendices, reading recommendations, and a dedicated web site for additional resources make this book an indispensable guide to this rapidly evolving field.The Graphics Rendering Pipeline; Transforms; Visual Appearance; Texturing; Special Effects; Speed-Up Techniques; Pipeline Optimization; Polygonal Techniques; Intersection Test Methods; Collision Detection; Graphics Hardware; The Future; Some Linear Algebra; Trigonometry <br />Second Edition now available.""","Computers / General","English","2017-02-18 10:00:27","0","0000-00-00","2017-02-18 10:00:27","21ec63a9814babd4803f59f154b660fc",
+"85","Bird, Richard S.|Bird, Richard","Pearls of Functional Algorithm Design","9780521513388","Cambridge University Press","2010-11-01","0","1,","Default,","0","","277","","82,00","0","","","","Hardcover","0","","","Richard Bird takes a radically new approach to algorithm design, namely, design by calculation. These 30 short chapters each deal with a particular programming problem drawn from sources as diverse as games and puzzles, intriguing combinatorial tasks, and more familiar areas such as data compression and string matching. Each pearl starts with the statement of the problem expressed using the functional programming language Haskell, a powerful yet succinct language for capturing algorithmic ideas clearly and simply. The novel aspect of the book is that each solution is calculated from an initial formulation of the problem in Haskell by appealing to the laws of functional programming. Pearls of Functional Algorithm Design will appeal to the aspiring functional programmer, students and teachers interested in the principles of algorithm design, and anyone seeking to master the techniques of reasoning about programs in an equational style.","","English","2017-02-18 10:00:38","0","0000-00-00","2017-02-18 10:00:38","33b476e7b39fc0b6a1a108fda125524a",
+"86","Smaalders, Steve Kleiman \\\\,Devang Shah\\\\, Bart","Programming With Threads","9790131723893","","","0","1,","Default,","0","","","","","0","","","","","0","","","","","","2017-02-18 10:03:08","0","0000-00-00","2017-02-18 10:03:08","fb3db04328b1706f1b8c86aba3bc8a46",
+"87","Watanabe, Scott","Solaris 10 ZFS Essentials","9780137000104","Sun Microsystems Press","2009-12-01","0","1,","Default,","0","","124","","39,99","0","","","","Paperback","0","","","The ZFS file system offers a dramatic advance in data management with an innovative approach to data integrity, tremendous performance improvements, and a welcome integration of file system and volume management capabilities. The centerpiece of this new architecture is the concept of a virtual storage pool, which decouples the file system from physical storage in the same way that virtual memory abstracts the address space from physical memory, allowing for much more efficient use of storage devices. In ZFS, space is shared dynamically between multiple file systems from a single storage pool and is parceled out from the pool as file systems request it. Physical storage can therefore be added to storage pools dynamically, without interrupting services. This provides new levels of flexibility, availability, and performance. Because ZFS is a 128-bit file system, its theoretical limits are truly mind-boggling 2128 bytes of storage and 264 for everything else, including file systems, snapshots, directory entries, devices, and more. ""Solaris"" "" 10 ZFS Essentials ""is the perfect guide for learning how to deploy and manage ZFS file systems. If you are new to Solaris or are using ZFS for the first time, you will find it very easy to get ZFS up and running on your home system or your business IT infrastructure by following the simple instructions in this book. Then you too will understand all the benefits ZFS offers:<br />Rock-solid data integrity No silent data corruption ever Mind-boggling scalability Breathtaking speed Near-zero administration ""Solaris"" "" 10 ZFS Essentials ""is part of the Solaris System Administration Series and is intended for use as a full introduction and hands-on guide to Solaris ZFS.""","","English","2017-02-18 10:03:30","0","0000-00-00","2017-02-18 10:03:30","b675207a0df20c9b2be09fcf587db403",
+"88","Matthew, Neil|Stones, Richard|Stones, Neil Matthew and Richard|Clements, Brad|Froggatt, Andrew|Goodger, David J.|Griffin, Ivan|Licquia, Jeff|Loon, Ronald van|Rawat, Harish|Ranawake, Udaya|Sundbakken, Marius|Thomas, Deepak|Turnbull, Stephen J.|Woodhouse, David|Browne, Christopher","Professional Linux Programming","9781861003010","Wrox Press","2000-09-15","0","1,","Default,","0","","1184","","59,99","0","","","","Paperback","0","","","Linux is a free, UNIX-like operating system created by Linus Torvald in 1991 that is developed by a loosely knit team of programmers working from all over the world. It works from on almost every kind of computer in existence, and provides a robust platform for a wide variety of applications.","","English","2017-02-18 10:03:43","0","0000-00-00","2017-02-18 10:03:43","89e915dd0e72ddf4a3bda156ca817c0b",
+"89","Gilly, Daniel|Media, The staff of O'Reilly|Inc., O'Reilly Media|Associates, O'Reilly &","UNIX in a Nutshell: System V Edition: A Desktop Quick Reference for System V Release 4 and Solaris 2.0","9781565920019","O'Reilly Media","1992-06-08","0","1,","Default,","0","","444","","","0","","","","Paperback","0","","","You may have seen UNIX quick-reference guides, but you've never seen anything like <i>UNIX in a Nutshell</i>. Not a scaled-down quick reference of common commands, <i>UNIX in a Nutshell</i> is a complete reference containing all commands and options, along with generous descriptions and examples that put the commands in context. For all but the thorniest UNIX problems, this one reference should be all the documentation you need.<br /><br />The second edition of <i>UNIX in a Nutshell</i> starts with thorough coverage of System V Release 3. To that, we've added the many new commands that were added to Release 4 and additional commands that were added to Solaris 2.0.<br /><br />Contents include:<br /><br /><br />All user and programmer commands. New Korn shell documentation. Expanded text editing section, including GNU Emacs and <i>nawk</i>. Shell syntax (<i>sh</i> and <i>csh</i>). Pattern-matching syntax.<br /><i>vi</i> and <i>ex</i> commands.<br /><i>sed</i> and <i>awk</i> commands.<br /><i>troff</i> and related commands and macros.<br /><i>sdb</i> and <i>dbx</i> commands. If you currently use either SVR3 or SVR4 or are planning to in the future, or if you're a Sun user facing the transition to Solaris, you'll want this book. <i>UNIX in a Nutshell</i> is the most comprehensive quickref on the market, a must for any UNIX user.","UNIX System V (Computer file)","English","2017-02-18 10:03:57","0","0000-00-00","2017-02-18 10:03:57","e980f3b34500a430f8b1f24c0576fb13",
+"90","Rago, Stephen A.|Stevens, W. Richard","Advanced Programming in the UNIX Environment","9780201433074","Addison-Wesley Professional","2005-06-17","0","1,","Default,","0","2nd Edition","927","","79,99","0","","","","Hardcover","0","","","A major revision of the definitive guide to Unix system programming with sales exceeding 160,000 units! It describes and illustrates more than 200 system calls - the interface that programmers must master in order to access all major Unix internal resources. The New Edition covers the final POSIX.1 standard as well as threads and multi-threaded programming. It includes all new examples, over 10,000 lines of code, running on Linux, Solaris, Free BSD and MAC OS X. Advanced Programming in the Unix Environment is a must-have volume describing and illustrating the programming interface to the Unix system. Author builds on the basic information presented in the first 15 chapters to provide chapter-length examples illustrating among other things how to develop a database library as well as a postscript print driver. The book progresses from basic topics such as file systems, directories, and signals to more advanced topics including interprocess communications, threads and multi-threaded programming. Extensive code examples in C combined with a clear writing style make the more difficult aspects of Unix programming easy to master. programmer how to get the most of their Unix system whether its Linux, Solaris, Free BSD or Mac OS X.","Computers / Operating Systems / UNIX","English","2017-02-18 10:04:15","0","0000-00-00","2017-02-18 10:04:15","27a0619eb75c4f27464c4585da1801a6",
+"91","Love, Robert","Linux Kernel Development","9780672329463","Addison-Wesley Professional","2010-06-25","0","1,","Default,","0","3rd Edition","440","","49,99","0","","","","Paperback","0","","","""Linux Kernel Development"" details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:<br /><br />An all-new chapter on kernel data structures<br />Details on interrupt handlers and bottom halves<br />Extended coverage of virtual memory and memory allocation<br />Tips on debugging the Linux kernel<br />In-depth coverage of kernel synchronization and locking<br />Useful insight into submitting kernel patches and working with the Linux kernel community","","English","2017-02-18 10:04:27","0","0000-00-00","2017-02-18 10:04:27","8476b2060f731125f7f08367461b5a64",
+"92","Kong, Joseph","Designing BSD Rootkits: An Introduction to Kernel Hacking","9781593271428","No Starch Press","2007-04-01","0","1,","Default,","0","","136","","29,95","0","","","","Paperback","0","","","Though rootkits have a fairly negative image, they can be used for both good and evil. <i>Designing BSD Rootkits</i> arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.<br /><br />Organized as a tutorial, <i>Designing BSD Rootkits</i> will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.<br /><br />Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.<br /><br />Included: <br />The fundamentals of FreeBSD kernel module programmingUsing call hooking to subvert the FreeBSD kernelDirectly manipulating the objects the kernel depends upon for its internal record-keepingPatching kernel code resident in main memory; in other words, altering the kernel's logic while it's still runningHow to defend against the attacks describedHack the FreeBSD kernel for yourself!","Computers / Security / Online Safety & Privacy","English","2017-02-18 10:04:41","0","0000-00-00","2017-02-18 10:04:41","55b898f0606d3689bb35cadb8f9bcbd6",
+"93","McKusick, Marshall Kirk|Neville-Neil, George V.","Design and Implementation of the FreeBSD Operating System, The","9780201702453","Addison-Wesley Professional","2004-08-01","0","1,","Default,","0","","720","","79,99","0","","","","Hardcover","0","","","This title provides a concise overview of FreeBSD's design and implementation. While explaining key design decisions, it details the concepts, data structures, and algorithms used in implementing the systems facilities. It is both a practical reference and an in-depth study of a contemporary, portable, open source operating system.","Computers / Operating Systems / General","English","2017-02-18 10:04:51","0","0000-00-00","2017-02-18 10:04:51","d50ff91bdb375d58ec8b67167b822986",
+"94","Westlund, Christer","Gör Studierna Enklare - Och Förbered Dig För Livet I Kunskapssamhället","9789197603621","Me University AB","2006","0","1,","Default,","0","","","","","0","","","","","0","","","","","","2017-02-18 10:07:30","0","0000-00-00","2017-02-18 10:07:30","b837c132f43827d099e46dc2b85c9bee",
+"95","Theis, Jim","Eye of Argon, The","9780809562619","Wildside Press","2007-04-17","0","1,","Default,","0","","74","","10,00","0","","","","Paperback","0","","","Jim Theis wrote this novel in 1970 and published it in a fanzine. Since then, it has circulated in science fiction circles, gaining a wide audience.","Fiction / Fantasy / Epic","English","2017-02-18 10:08:15","0","0000-00-00","2017-02-18 10:08:15","6f1c3f5d1b01ff1169f60b1ed223932a",
+"96","Sebesta, Robert W.","Concepts of Programming Languages","9780273769101","Pearson/Education","2012-04-01","0","1,","Default,","0","","816","","85,59","0","","","","Paperback","0","","","For undergraduate students in Computer Science and Computer Programming courses. Now in its Tenth Edition, Concepts of Programming Languages introduces students to the main constructs of contemporary programming languages and provides the tools needed to critically evaluate existing and future programming languages. Readers gain a solid foundation for understanding the fundamental concepts of programming languages through the author's presentation of design issues for various language constructs, the examination of the design choices for these constructs in some of the most common languages, and critical comparison of the design alternatives. In addition, Sebesta strives to prepare the reader for the study of compiler design by providing an in-depth discussion of programming language structures, presenting a formal method of describing syntax, and introducing approaches to lexical and syntactic analysis.","","English","2017-02-18 10:08:53","0","0000-00-00","2017-02-18 10:08:53","356cdd4b96a21a462dbb95664a36a285",
+"97","Sestoft, Peter","Programming Language Concepts","9781447141556","Springer","2012-06-10","0","1,","Default,","0","Undergraduate Topics in Computer Science","278","","59,95","0","","","","Paperback","0","","","<i>Programming Language Concepts</i> uses a functional programming language (F#) as the metalanguage in which to present all concepts and examples, and thus has an operational flavour, enabling practical experiments and exercises. It includes basic concepts such as abstract syntax, interpretation, stack machines, compilation, type checking, and garbage collection techniques, as well as the more advanced topics on polymorphic types, type inference using unification, co- and contravariant types, continuations, and backwards code generation with on-the-fly peephole optimization.<br /><br /><i>Programming Language Concepts</i> covers practical construction of lexers and parsers, but not regular expressions, automata and grammars, which are well covered elsewhere. It throws light on the design and technology of Java and C# to strengthen students understanding of these widely used languages.<br /><br />The examples present several interpreters and compilers for toy languages, including a compiler for a small but usable subset of C, several abstract machines, a garbage collector, and ML-style polymorphic type inference. Each chapter has exercises based on such examples.<br /><br />""","Computers / Programming / General","English","2017-02-18 10:09:07","0","0000-00-00","2017-02-18 10:09:07","0c1e45c2b53ec64f538fdd70fe5afa12",
+"98","Adams, Scott","Dilbert 2.0: 20 Years of Dilbert","0740777351","Andrews McMeel Publishing","2008-10-21","0","1,","Default,","0","","576","","85,00","0","","","","Hardcover","0","","","In the tradition of <i>The Complete Far Side</i> and <i>The Complete Calvin and Hobbes</i>, <i>Dilbert 2.0</i> celebrates the 20th anniversary of Scott Adams's <i>Dilbert</i>, the touchstone of office humor.<br /><br />This special slip-cased collection-weighing in at more than ten pounds with 600 pages and featuring almost 4,000 strips-takes readers behind the scenes and into the early days of Scott Adams's life pre-Dilbert and on to the success that followed when <i>Dilbert</i> became an internationally syndicated sensation.<br /><br />Divided into five different epochs, <i>Dilbert 2.0</i> gives readers a glance at some of Adams's earliest strips, like those created for <i>Playboy</i>, and a peek at an abundance of special content ranging from numerous rejection letters to Adams's first cartooning check, and more.<br /><br />Adams personally selected the material for this collection and offers original comments and humorous asides throughout. Also included is a piracy-protected disc that contains every <i>Dilbert</i> comic strip to April 2008.","Humor / Topic / Business & Professional","English","2017-02-18 10:09:49","0","0000-00-00","2017-02-18 10:09:49","a705564ff52b72a668869bfcdac40998",
+"99","Watt, David","Programming Language Concepts Paradigms","9780137288663","Prentice Hall PTR","1993-09-24","0","1,","Default,","0","Prentice Hall International Series in Computer Science","340","","49,99","0","","","","Paperback","0","","","The first of a series of three books on programming languages directed to undergraduate and graduate students of computer science and information technology. Explains both the basic and some advanced concepts underlying almost all programming languages, and surveys the major programming paradigms with overviews of several important languages.","","English","2017-02-18 10:10:15","0","0000-00-00","2017-02-18 10:10:15","8999a4e848f6e935806f2615ff017c2c",
+"100","Booch, Grady","Object-Oriented Analysis and Design with Applications","9780805353402","Addison-Wesley Professional","1993-09-30","0","1,","Default,","0","Addison-Wesley Object Technology Series|2nd Edition","608","","74,99","0","","","","Hardcover","0","","","Grady Booch draws upon the rich and varied results of these projects to offer improved methods for object development and a new, unified notation. With numerous examples, all of which are now implemented in C++, Booch illustrates essential concepts, explains the method, and shows successful applications in a variety of fields. You'll also find pragmatic advice on a host of issues, including classification, implementation strategies, and cost-effective project management.","Computers / Programming / Object Oriented","English","2017-02-18 10:10:28","0","0000-00-00","2017-02-18 10:10:28","08a4bfbe160e3d1473d548c20d34759e",
+"101","Murphy, Niall Richard|Malone, David|Murphy, Niall","IPv6 Network Administration","9780596009342","O'Reilly Media","2005-03-09","0","1,","Default,","0","","308","","49,99","0","","","","Paperback","0","","","What once seemed nearly impossible has turned into reality. The number of available Internet addresses is now nearly exhausted, due mostly to the explosion of commercial websites and entries from an expanding number of countries. This growing shortage has effectively put the Internet community--and some of its most brilliant engineers--on alert for the last decade.<br /><br />Their solution was to create IPv6, a new Internet standard which will ultimately replace the current and antiquated IPv4. As the new backbone of the Internet, this new protocol would fix the most difficult problems that the Internet faces today--scalability and management. And even though IPv6's implementation has met with some resistance over the past few years, all signs are now pointing to its gradual worldwide adoption in the very near future. Sooner or later, all network administrators will need to understand IPv6, and now is a good time to get started.<br /><br /><i>IPv6 Network Administration</i> offers administrators the complete inside info on IPv6. This book reveals the many benefits as well as the potential downsides of this next-generation protocol. It also shows readers exactly how to set up and administer an IPv6 network.<br /><br />A must-have for network administrators everywhere, <i>IPv6 Network Administration</i> delivers an even-handed approach to what will be the most fundamental change to the Internet since its inception. Some of the other IPv6 assets that are covered include:<br /><br /><br />routing<br />integrated auto-configuration<br />quality-of-services (QoS)<br />enhanced mobility<br />end-to-end security<br /><br /><i>IPv6 Network Administration</i> explains what works, what doesn't, and most of all, what's practical when considering upgrading networks from the current protocol to IPv6.<br />","Computers / Networking / Intranets & Extranets","English","2017-02-18 10:10:40","0","0000-00-00","2017-02-18 10:10:40","633b278b44b76d1736dfab9eb01d98f2",
+"102","Comer, Douglas E.","Internetworking with TCP/IP Volume 1 : Principles, Protocols and Architecture","9780132278362","Pearson Education (US)","1995-12","0","1,","Default,","0","","640","","","0","","","","Paperback","0","","","","","English","2017-02-18 10:10:51","0","0000-00-00","2017-02-18 10:10:51","b506c57acff8b5d930496c314181d463",
+"103","Hunt, Craig","TCP/IP Network Administration","9780937175828","O'Reilly Media","1992-08-08","0","1,","Default,","0","","502","","32,95","0","","","","Paperback","0","","","<i>TCP/IP Network Administration</i> is a complete guide to setting up and running a TCP/IP network for administrators of networks of systems or users of home systems that access the Internet. It starts with the fundamentals: what the protocols do and how they work, how to request a network address and a name (the forms needed are included in an appendix), and how to set up your network.<br /><br />Beyond basic setup, the book discusses how to configure important network applications, including sendmail, the r* commands, and some simple setups for NIS and NFS. There are also chapters on troubleshooting and security. In addition, this book covers several important packages that are available from the Net (such as <i>gated</i>).<br /><br />Contents include:<br /><br /><br />Overview of TCP/IP Delivering the data Name service concepts Getting started Basic configuration Configuring the interface Configuring routing Configuring DNS name service Network applications sendmail Troubleshooting TCP/IP Network security Other sources of information Appendixes include: network contacts, forms, a <i>gated</i> reference, named reference Covers BSD and System V TCP/IP implementations.","","English","2017-02-18 10:11:01","0","0000-00-00","2017-02-18 10:11:01","6f0177b72b278e5a6946f4b5298eff78",
+"104","Nemeth, Evi|Snyder, Garth|Seebass, Scott|Hein, Trent","UNIX System Administration Handbook","9780130206015","Prentice Hall PTR","2000-09-08","0","1,","Default,","0","3rd Edition","853","","88,99","0","","","","Paperback","0","","","This new edition of the world's most comprehensive guide to UNIX administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include ""direct from the frontlines"" coverage of Red Hat Linux. <strong>UNIX System Administration Handbook</strong> describes every aspect of system administration - from basic topics to UNIX esoterica - and provides explicit cover of four popular UNIX systems:<br /><br />- Red Hat Linux<br />- Solaris<br />- HP-UX<br />- FreeBSD<br /><br />This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems - warts and all.","Computers / Operating Systems / UNIX","English","2017-02-18 10:11:11","0","0000-00-00","2017-02-18 10:11:11","9ccab022033d4f56769dd7dce0cbd286",
+"105","Nemeth, Evi|Hein, Trent R.|Snyder, Garth","Unix System Administration Handbook","9780131510517","Prentice Hall PTR","1995-01-15","0","1,","Default,","0","Bk/CD ROM|2nd Edition","779","","115,99","0","","","","Paperback","0","","","This major revision of the best-selling and single most comprehensive guide to UNIX system administration is ideal as both an introductory tutorial for those new to system administration AND a day-to-day reference for “power administrators.” Practical and hands-on in approach, it covers every aspect of system administration — from basic topics to UNIX esoterica — and provides explicit instructions for dealing with the six most popular versions of UNIX. Covers topics such as The Filesystem; Controlling Processes; Serial Devices; Periodic Processes; Backups; Syslog and Log Files; Configuring the Kernel; TCP/IP and Routing; The Domain Name System; The Network File System; Sharing System Files; SLIP and PPP; The Internet; Security; Printing and Imaging; Disk Space Management; Accounting; and UUCP. Includes CD ROM with source code, sample programs, and other tools and utilities helpful to UNIX SYSTEM ADMINISTRATION For system administrators and users of the UNIX operating system. ISBN of first edition: 0-13-933441-6.","Computers / Operating Systems / UNIX","English","2017-02-18 10:11:24","0","0000-00-00","2017-02-18 10:11:24","76f5a142654d0f0a468572fcc70595f6",
+"106","Vahalia, Uresh|Salus, Peter H.","UNIX Internals: The New Frontiers","9780131019089","Pearson","1995-11-02","0","1,","Default,","0","","601","","177,60","0","","","","Paperback","0","","","<b> </b> This book offers an exceptionally up-to-date, in-depth, and broad-based exploration of the latest advances in UNIX-based operating systems. Focusing on the design and implementation of the operating system itself not on the applications and tools that run on it -- this book compares and analyzes the alternatives offered by several important UNIX variants, and covers several advanced subjects, such as multi-processors and threads. <b> </b> Compares <b>several important UNIX variants</b> highlighting the <b>issues and alternative solutions</b> for <b>various operating system components</b>. Describes <b>advanced technologies</b> such as multiprocessor and multithreaded systems, log- structured file systems, and modern memory architecture.<br /><br />""","Computers / Operating Systems / UNIX","English","2017-02-18 10:11:35","0","0000-00-00","2017-02-18 10:11:35","28458522cfd74d59068fc2baf12b2c71",
+"107","Schmidt, Friedhelm|Schmidt, F.","SCSI Bus and Ide Interface: Protocals, Applications and Programming [With A Fully Updated Disk Contains the Source Code...], The","9780201175141","Addison-Wesley Professional","1995-04","0","1,","Default,","0","2nd Edition","416","","57,99","0","","","","Paperback","0","","","Almost all computers, including PCs, workstations and mainframes are equipped with a SCSI interface. SCSI Bus is designed for hard drives, tape drives, CD-ROMs, scanners and printers, while the IDE hard disk interface is found almost exclusively in the world of IBM PC compatibles.","Computers / Data Transmission Systems / General","English","2017-02-18 10:12:23","0","0000-00-00","2017-02-18 10:12:23","b1b8bb08f92f78a573ce97bb51265721",
+"108","Hyde, John","Usb Design By Example: A Practical Guide To Building I/O Devices","9780471370482","Wiley","1999-09-13","0","1,","Default,","0","","370","","55,00","0","","","","Paperback","0","","","A complete, how-to guide to designing USB devices<br /><br /> The Universal Serial Bus (USB) is a new standard specification for PC peripherals that provides a uniform approach to developing products that work together seamlessly through a single, one-size-fits-all plug and port connection. Virtually all new PCs, and the iMac, now ship with USB ports. Written by an Intel insider, this practical, step-by-step guide uses fully documented examples to get developers up to speed on everything they need to know to design and program USB devices-from schematics and codes to prototypes. The book is specially formatted to serve as both a step-by-step manual for creating specific devices, and a complete reference to understanding and using the USB.<br /><br /> CD-ROM contains all the source code for the examples in the book, color versions of selected diagrams, photographs, and a link to the USB specification site.","Computers / Programming / General","English","2017-02-18 10:12:44","0","0000-00-00","2017-02-18 10:12:44","ad59ea9cbf7f196c39e2fd74f59aa2c9",
+"109","Colting, Fredrik|Gadd, Carl-Johan","Vacker hud","9789185869404","Nicotext","2008-09-29","0","1,","Default,","0","Hälsoserien","64","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:13:07","0","0000-00-00","2017-02-18 10:13:07","463c3a683fff23fb35215c96ac3f346b",
+"110","Lars Lönnroth, Hans-Erik Johannesson","Den Svenska Litteraturen","9789134514225","","","0","1,","Default,","0","","","","","0","","","","","0","","","","","","2017-02-18 10:15:49","0","0000-00-00","2017-02-18 10:15:49","ca69ef3f5cd552b08a470e2ab92b22c8",
+"111","Robbins, Arnold|Lamb, Linda|Hannah, Elbert","Learning the vi and Vim Editors","9780596529833","O'Reilly Media","2008-07-22","0","1,","Default,","0","","494","","34,99","0","","","","Paperback","0","","","There's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's.<br /><br /><i>vi</i> has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a growing following on Windows systems, too. Most experienced system administrators cite <i>vi</i> as their tool of choice. And since 1986, this book has been <i>the</i> guide for <i>vi</i>.<br /><br /> However, Unix systems are not what they were 30 years ago, and neither is this book. While retaining all the valuable features of previous editions, the 7th edition of <i>Learning the vi and vim Editors</i> has been expanded to include detailed information on <i>vim</i>, the leading <i>vi</i> clone. <i>vim</i> is the default version of <i>vi</i> on most Linux systems and on Mac OS X, and is available for many other operating systems too.<br /><br /> With this guide, you learn text editing basics and advanced tools for both editors, such as multi-window editing, how to write both interactive macros and scripts to extend the editor, and power tools for programmers -- all in the easy-to-follow style that has made this book a classic.<br /><br /><i>Learning the vi and vim Editors</i> includes:<br /><br /><b>A complete introduction to text editing with vi:</b><br /><br />How to move around <i>vi</i> in a hurry Beyond the basics, such as using buffers <i>vi's</i> global search and replacement Advanced editing, including customizing <i>vi</i> and executing Unix commands<br /><br /><b>How to make full use of vim:</b> Extended text objects and more powerful regular expressions Multi-window editing and powerful <i>vim</i> scripts How to make full use of the GUI version of <i>vim</i>, called <i>gvim</i> <i>vim's</i> enhancements for programmers, such as syntax highlighting, folding and extended tags<br /><br /> Coverage of three other popular <i>vi</i> clones -- <i>nvi</i>, <i>elvis</i>, and <i>vile</i> -- is also included. You'll find several valuable appendixes, including an alphabetical quick reference to both <i>vi</i> and <i>ex</i> mode commands for regular <i>vi</i> and for <i>vim</i>, plus an updated appendix on <i>vi</i> and the Internet.<br /><br /> Learning either <i>vi</i> or <i>vim</i> is required knowledge if you use Linux or Unix, and in either case, reading this book is essential. After reading this book, the choice of editor will be obvious for you too.","Computers / User Interfaces","English","2017-02-18 10:17:08","0","0000-00-00","2017-02-18 10:17:08","92b5a8e71e85105fd92f4138243c9b03",
+"112","Cameron, Debra|Loy, Marc|Elliott, James|Raymond, Eric S.|Rosenblatt, Bill|Raymond, Eric","Learning GNU Emacs","9780596006488","O'Reilly Media","2004-12-20","0","1,","Default,","0","","536","","44,99","0","","","","Paperback","0","","","GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment--you can stay within Emacs all day without leaving. <i>Learning GNU Emacs</i>, 3rd Edition tells readers how to get started with the GNU Emacs editor. It is a thorough guide that will also ""grow"" with you: as you become more proficient, this book will help you learn how to use Emacs more effectively. It takes you from basic Emacs usage (simple text editing) to moderately complicated customization and programming.<br /><br />The third edition of <i>Learning GNU Emacs</i> describes Emacs 21.3 from the ground up, including new user interface features such as an icon-based toolbar and an interactive interface to Emacs customization. A new chapter details how to install and run Emacs on Mac OS X, Windows, and Linux, including tips for using Emacs effectively on those platforms.<br /><br /><i>Learning GNU Emacs</i>, third edition, covers:<br /><br /><br />How to edit files with Emacs<br />Using the operating system shell through Emacs<br />How to use multiple buffers, windows, and frames<br />Customizing Emacs interactively and through startup files<br />Writing macros to circumvent repetitious tasks<br />Emacs as a programming environment for Java, C++, and Perl, among others<br />Using Emacs as an integrated development environment (IDE)<br />Integrating Emacs with CVS, Subversion and other change control systems for projects with multiple developers<br />Writing HTML, XHTML, and XML with Emacs<br />The basics of Emacs Lisp<br />The book is aimed at new Emacs users, whether or not they are programmers. Also useful for readers switching from other Emacs implementations to GNU Emacs.","Computers / Desktop Applications / Word Processing","English","2017-02-18 10:17:25","0","0000-00-00","2017-02-18 10:17:25","83235de72dc177cbcf285b013c9b4cd2",
+"113","Seabrook, John","Deeper","0571175333","Faber & Faber","1997-02-01","0","1,","Default,","0","","304","","","0","","","","Hardcover","0","","","In Deeper, John Seabrook, a staff writer for the New Yorker, takes us along his personal journey down the information highway. In the beginning of this pioneering adventure into cyberspace, our hero (seabrook) is a clueless newbie. He ends up an old hand, complete with arrow wounds to show off. When Seabrook is not narrating his own on-line adventures, he is writing an eyewitness history of a tumultuous period in the early history of a new medium, when the Net moved decisively from a geeky hobby to a part of mainstream popular culture. We meet major figures in the computer industry, catch the utopian feeling, get flamed, get laid, soar over the Net like Satan soaring over the Earth in Paradise Lost, join a virtual community and find out what daily life is like, lose the utopian feeling, adapt to the World Wide Web, and build a Web site.","","English","2017-02-18 10:17:53","0","0000-00-00","2017-02-18 10:17:53","6e8931786b58e42c90b33b88b9cf70e0",
+"114","Levy, Steven","Hackers: Heroes of the Computer Revolution","9780141000510","Penguin Books","2001-01-01","0","1,","Default,","0","","464","","16,00","0","","","","Paperback","0","","","A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's <i>Hackers</i> brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.","Fiction / Thrillers / Suspense","English","2017-02-18 10:18:21","0","0000-00-00","2017-02-18 10:18:21","73ae9369088466309030c778bc309140",
+"115","III, Samuel P. Harbison|Jr., Guy L. Steele|Harbison, Samuel P.","C: A Reference Manual","9780130895929","Prentice Hall","2002-03-03","0","1,","Default,","0","5th Edition","560","","87,00","0","","","","Paperback","0","","","This authoritative reference manual provides a complete description of the C language, the run-time libraries, and a style of C programming that emphasizes correctness, portability, and maintainability. The authors describe the C language more clearly and in more detail than in any other book.","Computers / Programming Languages / C","English","2017-02-18 10:18:33","0","0000-00-00","2017-02-18 10:18:33","f8e136b59df61e16eb07636494377ccd",
+"116","Kernighan, Brian W.|Ritchie, Dennis M.","C Programming Language, The","9780131103627","Prentice Hall","1988-04-01","0","1,","Default,","0","","274","","67,00","0","","","","Paperback","0","","","This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a worldwide best-seller. This second edition brings the classic original up to date to include the ANSI standard. <br /><br /> From the Preface: <br /> We have tried to retain the brevity of the first edition. C is not a big language, and it is not well served by a big book. We have improved the exposition of critical features, such as pointers, that are central to C programming. We have refined the original examples, and have added new examples in several chapters. For instance, the treatment of complicated declarations is augmented by programs that convert declarations into words and vice versa. As before, all examples have been tested directly from the text, which is in machine-readable form. <p> As we said in the first preface to the first edition, C ""wears well as one's experience with it grows."" With a decade more experience, we still feel that way. We hope that this book will help you to learn C and use it well.</p>","","English","2017-02-18 10:18:42","0","0000-00-00","2017-02-18 10:18:42","a143cb1596037e6f70c9a991bf767179",
+"117","Oualline, Steve","Practical C Programming","9781565923065","O'Reilly Media","1997-08-11","0","1,","Default,","0","Nutshell Handbooks","456","","34,95","0","","","","Paperback","0","","","<div><p>There are lots of introductory C books, but this is the first one that has the no-nonsense, practical approach that has made Nutshell Handbooks® famous.C programming is more than just getting the syntax right. Style and debugging also play a tremendous part in creating programs that run well and are easy to maintain. This book teaches you not only the mechanics of programming, but also describes how to create programs that are easy to read, debug, and update.Practical rules are stressed. For example, there are fifteen precedence rules in C (&& comes before || comes before ?:). The practical programmer reduces these to two:</p><ul><li>Multiplication and division come before addition and subtraction.</li></ul>Contrary to popular belief, most programmers do not spend most of their time creating code. Most of their time is spent modifying someone else's code. This books shows you how to avoid the all-too-common obfuscated uses of C (and also to recognize these uses when you encounter them in existing programs) and thereby to leave code that the programmer responsible for maintenance does not have to struggle with. Electronic Archaeology, the art of going through someone else's code, is described.This third edition introduces popular Integrated Development Environments on Windows systems, as well as UNIX programming utilities, and features a large statistics-generating program to pull together the concepts and features in the language.</div>","Computers / Software Development & Engineering / General","English","2017-02-18 10:18:49","0","0000-00-00","2017-02-18 10:18:49","9f36770c7c6e69b1fb019da9a0a9339f",
+"118","Droms, Ralph|Ph.D., Ralph Droms|Lemon, Ted","DHCP Handbook, The","9780672323270","Sams Publishing","2002-11-07","0","1,","Default,","0","2nd Edition","624","","54,99","0","","","","Paperback","0","","","Written by the two principal creators of the protocol and key implementers of the technology, this text shows you how to automate and manage your network configurations more efficiently with DHCP. This edition has been revised to include modifications to the standard, deeper implementation detail and more practical scenarios. It discusses features of DHCPv6, which should help prepare companies for migration to IPv6.","Computers / Networking / Network Protocols","English","2017-02-18 10:19:56","0","0000-00-00","2017-02-18 10:19:56","41a6544ca6a8c99311c98ee0c347adcd",
+"119","Stallings, William","Snmp, Snm Pv And Cmip: The Practical Guide To Network Management Standards","9780201633313","Addison Wesley Publishing Company","1993-05-01","0","1,","Default,","0","","512","","51,59","0","","","","Hardcover","0","","","A comprehensive introduction to network-management standards. Part I is a survey of network-management technology and techniques. Part II presents the SNMP family of standards, including SNMP itself, secure SNMP, and SNMPv2. An important enhancement of SNMP, known as RMON (remote monitoring) is also","Computers / Networking / Network Protocols","English","2017-02-18 10:20:06","0","0000-00-00","2017-02-18 10:20:06","528f74160cf2ab45bd62fd4f7437a3a0",
+"120","Gregg, Brendan|Mynhier, Chad|Magdon-Ismail, Tariq|Mauro, Jim","DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD","9780132091510","Prentice Hall","2011-04-11","0","1,","Default,","0","","1115","","59,99","0","","","","Paperback","0","","","The Oracle Solaris DTrace feature revolutionizes the way you debug operating systems and applications. Using DTrace, you can dynamically instrument software and quickly answer virtually any question about its behavior. Now, for the first time, there's a comprehensive, authoritative guide to making the most of DTrace in any supported UNIX environment--from Oracle Solaris to OpenSolaris, Mac OS X, and FreeBSD. Written by key contributors to the DTrace community, ""DTrace ""teaches by example, presenting scores of commands and easy-to-adapt, downloadable D scripts. These concise examples generate answers to real and useful questions, and serve as a starting point for building more complex scripts. Using them, you can start making practical use of DTrace immediately, whether you're an administrator, developer, analyst, architect, or support professional. The authors fully explain the goals, techniques, and output associated with each script or command. Drawing on their extensive experience, they provide strategy suggestions, checklists, and functional diagrams, as well as a chapter of advanced tips and tricks. You'll learn how to<br />Write effective scripts using DTrace's D language Use DTrace to thoroughly understand system performance Expose functional areas of the operating system, including I/O, filesystems, and protocols Use DTrace in the application and database development process Identify and fix security problems with DTrace Analyze the operating system kernel Integrate DTrace into source code Extend DTrace with other tools This book will help you make the most of DTrace to solve problems more quickly and efficiently, and build systems that work faster and more reliably.""","Computers / Software Development & Engineering / Quality Assurance & Testing","English","2017-02-18 10:20:15","0","0000-00-00","2017-02-18 10:20:15","6fcd8de2ee531cc01ac0c61b648a1612",
+"121","Språknämden, Svenska","Svenska Skrivregler","9789147049745","Liber","","0","1,","Default,","0","","","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:21:30","0","0000-00-00","2017-02-18 10:21:30","ce34b9307d392f803853a88abff27ca3",
+"122","Vromans, Johan|Mui, Linda","Perl 5 Pocket Reference: Programming Tools","9780596000325","O'Reilly Media","2000-06-08","0","1,","Default,","0","O'Reilly Pocket Reference|O'Reilly Perl","96","","9,95","0","","","","Paperback","0","","","Revised to cover Perl Version 5.6, this quick reference provides a complete overview of the Perl programming language, all packed into a convenient, carry-around booklet.<br /><br />This third edition covers:<br /><br /><br />A summary of Perl syntax rules<br />A complete list of operators, built-in functions, and standard library modules, all with brief descriptions<br />The newest Perl features, such as enhanced regular expressions, multithreading, the Perl compiler, and unicode support <i>The Perl 5 Pocket Reference,</i> 3rd Edition, is the perfect companion to the authoritative books on Perl published by O'Reilly &amp; Associates: <i>Programming Perl,</i> <i>Learning Perl,</i> and the <i>Perl Cookbook.</i>","Computers / Programming Languages / JavaScript","English","2017-02-18 10:21:47","0","0000-00-00","2017-02-18 10:21:47","3942adb069f69802288b758ad56706e5",
+"123","DaCosta, Frank","How to Build Your Own Working Robot Pet","0830697969","Tab Books","1979-01-01","0","1,","Default,","0","","238","","66,98","0","","","","Hardcover","0","","","(2) Page edges have some browning and spot stains, in good reading condition, dirty from shelf, pages are in great reading condition.","","English","2017-02-18 10:22:32","0","0000-00-00","2017-02-18 10:22:32","7ee46d20aba6dde117e8afeb4b908e0c",
+"124","Lucas, Michael W.|Lucas, Michael W|Lucas, Michael","SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys","9781470069711","CreateSpace Independent Publishing Platform","2012-02-17","0","1,","Default,","0","","150","","19,95","0","","","","Paperback","0","","","Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.<br /><br />This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:<br /><br />Eliminate passwords.<br />Manage access to your SSH server by users, groups, addresses, and more<br />Securely move files around your network<br />Forward graphic displays from one host to another<br />Forward TCP/IP connections<br />Centrally manage host keys and client configurations<br />Use SSH as a secure transport for other applications<br />Secure applications run over SSH<br />Build Virtual Private Networks with OpenSSH<br />And more! This book quickly and painlessly simplifies life for anyone using SSH.<br /><br />Review<br /><br />""Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals."" - Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger<br /><br />""...SSH Mastery is a title that Unix users and system administrators like myself will want to keep within reach..."" - Peter Hansteen<br /><br />""This stripping-down of the usual tech-book explanations gives it the immediacy of extended documentation on the Internet. ...an in-depth presentation from someone who used OpenSSH to do a number of things, and paid attention while doing it."" - Justin Sherrill, DragonFly BSD Digest","Computers / System Administration / Linux & UNIX Administration","English","2017-02-18 10:23:11","0","0000-00-00","2017-02-18 10:23:11","e74bda8b8c54b42867e2ddf1156be8ff",
+"125","Fettig, Abe","Twisted Network Programming Essentials","9780596100322","O'Reilly Media","2005-10-01","0","1,","Default,","0","","213","","29,95","0","","","","Paperback","0","","","""Twisted Network Programming Essentials"" from O'Reilly is a task-oriented look at this new open source, Python-based technology. The book begins with recommendations for various plug-ins and add-ons to enhance the basic package as installed. It then details Twisted's collection simple network protocols, and helper utilities. The book also includes projects that let you try out the Twisted framework for yourself. For example, you'll find examples of using Twisted to build web services applications using the REST architecture, using XML-RPC, and using SOAP.<br /><br />Written for developers who want to start building applications using Twisted, this comprehensive guide presents examples of the most common tasks you'll face when building network applications. It also helps you understand the key concepts and design patterns used in Twisted applications. Here are just some of the topics discussed in ""Twisted Network Programming Essentials"" Installing TwistedHow to make TCP connectionsHow to use Twisted to work with the WebTwisted's authentication frameworkUsenet and SSH clients and servers<br /><br />Along the way, each lesson is supported by thorough notes and explanations to make absolutely certain you're up to speed with this leading-edge Python technology.","Computers / System Administration / Email Administration","English","2017-02-18 10:23:30","0","0000-00-00","2017-02-18 10:23:30","4656e27552e9c5764440448a4326ea52",
+"126","Media, O'Reilly|Frauenfelder, M.|Frauenfelder, Mark","Make: The Third Year: Technology on Your Time","9780596517977","O'Reilly Media","2008-01-25","0","1,","Default,","0","","896","","59,99","0","","","","Paperback","0","","","With the third year completed, MAKE brings you Make: The Third Year Collector's Box Set, complete with volumes 09, 10, 11, and 12. Delve into Science on the Fringe, Home Electronics, Alternative Vehicles, Digital Media, and much more. Major projects include a Pinhole Camera, Cracker Box Amp, Brain Machine, Tabletop Biosphere, Retro R/C Racer, Home Vacuum-forming Setup, Mobile Drive-in, Solar Xylophone, and a Kinetic Remote Control.","","English","2017-02-18 10:23:43","0","0000-00-00","2017-02-18 10:23:43","196d3f01becbb68f002830751541da5e",
+"127","Boese, Alex","Elephants on Acid: And Other Bizarre Experiments","9780156031356","Mariner Books","2007-11-05","0","1,","Default,","0","Harvest Original","304","","15,95","0","","","","Paperback","0","","","When Tusko the Elephant woke in his pen at the Lincoln Park Zoo on the morning of August 3, 1962, little did he know that he was about to become the test subject in an experiment to determine what happens to an elephant given a massive dose of LSD. In Elephants on Acid, Alex Boese reveals to readers the results of not only this scientific trial but of scores of other outrageous, amusing, and provocative experiments found in the files of modern science. Why can’t people tickle themselves? Would the average dog summon help in an emergency? Will babies instinctually pick a well-balanced diet? Is it possible to restore life to the dead? Read Elephants on Acid and find out!","","English","2017-02-18 10:24:03","0","0000-00-00","2017-02-18 10:24:03","576a68696dfe3a6b4fd45f6b6b7857f0",
+"128","Frauenfelder, Mark","MAKE Magazine: The First Year: 4 Volume Collector's Set","9780596526771","O'Reilly Media","2005-12-19","0","1,","Default,","0","4 vol. set","896","","59,99","0","","","","Hardcover","0","","","From out of nowhere, MAKE has rapidly become one of the hottest new magazines to hit the newsstands. Often coined ""the bible of the Tech DIY movement"" MAKE has coalesced a passionate if rather unorthodox following of geeks, gearheads, tech enthusiasts, hackers, tinkerers and artists united by a common compulsion to reconfigure the technology in their lives; even when it means violating a manufacturer's warranty or two.<br /><br />Through the brilliantly written and beautifully illustrated magazine, podcasts and makezine.com website, the MAKE team has already won broad acclaim for their clear yet down-to-earth coverage and uncanny instinct for what moves Makers, and their ability to nail the curiosity, vibrance, and passion of the rapidly emerging ""tech DIY"" movement.<br /><br />In this special re-release, all 4-Volumes of MAKE's first year are combined in a special 4-Volume Collector's Set.","","English","2017-02-18 10:24:22","0","0000-00-00","2017-02-18 10:24:22","5a81783e2963ee74585b9ac2d74a9115",
+"129","Pilegaard, Ulrik|Dooley, Mike","Forbidden Lego: Build the Models Your Parents Warned You Against!","9781593271374","No Starch Press","2007-08-20","0","1,","Default,","0","","186","","24,95","0","","","","Paperback","0","","","It just may be impossible to exhaust the creative potential of LEGO bricks. With an active imagination as your guide, there are endless possibilities-provided you follow the LEGO Company's official (and sensible) rules. This means no cutting or tampering with bricks, creating models that shoot unapproved projectiles, or using non-standard parts with any LEGO product. After all, those little precision-molded ABS bricks can be dangerous in the wrong hands! Well, toss those rules out the window.<br /><br /><i>Forbidden Lego</i> introduces you to the type of free-style building that LEGO's master builders do for fun in the back room. Using LEGO bricks in combination with common household materials (from rubber bands and glue to plastic spoons and ping-pong balls) along with some very unorthodox building techniques, you'll learn to create working models that LEGO would never endorse. Try your hand at a toy gun that shoots LEGO plates, a candy catapult, a high voltage LEGO vehicle, a continuous-fire ping-pong ball launcher, and other useless but incredibly fun inventions.<br /><br />Once you get into the spirit, you'll want to try inventing your own rule-breaking models. Forbidden Lego's authors, share tips and tricks that will inspire you and help you turn your visions into reality. Nothing's against the rules in this book!","Technology & Engineering / Manufacturing","English","2017-02-18 10:24:35","0","0000-00-00","2017-02-18 10:24:35","41e23aef35c8df3b5d05f4a6041acfd3",
+"130","Nisan, Noam|Nison, Noam|Roughgarden, Tim|Tardos, Éva","Algorithmic Game Theory","9780521872829","Cambridge University Press","2013-12-06","0","1,","Default,","0","","776","","67,00","0","","","","Hardcover","0","","","In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and combinatorial auctions are followed by chapters on incentives and pricing, cost sharing, information markets and cryptography and security. Students, researchers and practitioners alike need to learn more about these fascinating theoretical developments and their widespread practical application.","","English","2017-02-18 10:24:54","0","0000-00-00","2017-02-18 10:24:54","f01c119eb5d933cb98fef9df399e02bb",
+"131","Jones, Richard|Lins, Rafael D|Lins, Rafael","Garbage Collection: Algorithms for Automatic Dynamic Memory Management","9780471941484","Wiley","1996-08-16","0","1,","Default,","0","","404","","","0","","","","Hardcover","0","","","Modern software places increasing reliance on dynamic memory allocation, but its direct management is not only notoriously error-prone. Garbage collection eliminates many of these bugs. This reference presents each of the most important algorithms in detail, often with illustrations of its characteristic features and animations of its use.","Computers / Internet / General","English","2017-02-18 10:25:06","0","0000-00-00","2017-02-18 10:25:06","50fdff073156080b50fa9c24280270d1",
+"132","Rost, Randi J.|Lichtenbelt, Barthold|Kessenich, John M.","OpenGL® Shading Language","9780321334893","Addison-Wesley Professional","2006-02-04","0","1,","Default,","0","2nd Edition","800","","69,99","0","","","","Paperback","0","","","<p>""As the 'Red Book' is known to be the gold standard for OpenGL, the 'Orange Book' is considered to be the gold standard for the OpenGL Shading Language. With Randi's extensive knowledge of OpenGL and GLSL, you can be assured you will be learning from a graphics industry veteran. Within the pages of the second edition you can find topics from beginning shader development to advanced topics such as the spherical harmonic lighting model and more.""</p> <p>—David Tommeraasen, CEO/Programmer, Plasma Software</p> <p>""This will be the definitive guide for OpenGL shaders; no other book goes into this detail. Rost has done an excellent job at setting the stage for shader development, what the purpose is, how to do it, and how it all fits together. The book includes great examples and details, and good additional coverage of 2.0 changes!""</p> <p>—Jeffery Galinovsky, Director of Emerging Market Platform Development, Intel Corporation</p> <p>""The coverage in this new edition of the book is pitched just right to help many new shader-writers get started, but with enough deep information for the 'old hands.'""</p> <p>—Marc Olano, Assistant Professor, University of Maryland</p> <p>""This is a really great book on GLSL—well written and organized, very accessible, and with good real-world examples and sample code. The topics flow naturally and easily, explanatory code fragments are inserted in very logical places to illustrate concepts, and all in all, this book makes an excellent tutorial as well as a reference.""</p> <p>—John Carey, Chief Technology Officer, C.O.R.E. Feature Animation</p> <p> <b> <i>OpenGL® Shading Language, Second Edition</i> </b>, extensively updated for OpenGL 2.0, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable graphics hardware and the additions to the OpenGL API that support this programmability. With OpenGL and shaders written in the OpenGL Shading Language, applications can perform better, achieving stunning graphics effects by using the capabilities of both the visual processing unit and the central processing unit.</p> <p>In this book, you will find a detailed introduction to the OpenGL Shading Language (GLSL) and the new OpenGL function calls that support it. The text begins by describing the syntax and semantics of this high-level programming language. Once this foundation has been established, the book explores the creation and manipulation of shaders using new OpenGL function calls.</p> <p> <i> <b>OpenGL® Shading Language, Second Edition</b> </i>, includes updated descriptions for the language and all the GLSL entry points added to OpenGL 2.0; new chapters that discuss lighting, shadows, and surface characteristics; and an under-the-hood look at the implementation of RealWorldz, the most ambitious GLSL application to date. The second edition also features 18 extensive new examples of shaders and their underlying algorithms, including</p> <ul> <li>Image-based lighting</li> </ul> <ul> <li>Lighting with spherical harmonics</li> </ul> <ul> <li>Ambient occlusion</li> </ul> <ul> <li>Shadow mapping</li> </ul> <ul> <li>Volume shadows using deferred lighting</li> </ul> <ul> <li>Ward's BRDF model</li> </ul> <p>The color plate section illustrates the power and sophistication of the OpenGL Shading Language. The API Function Reference at the end of the book is an excellent guide to the API entry points that support the OpenGL Shading Language. Also included is a convenient Quick Reference Card to GLSL. <br> <br>","Computers / Programming Languages / General","English","2017-02-18 10:25:21","0","0000-00-00","2017-02-18 10:25:21","46319c8c64f36006890c35f0c3b3edaf",
+"133","Shreiner, Dave|Group, The Khronos OpenGL ARB Working|Group, Bill The Khronos OpenGL ARB Working","OpenGL Programming Guide: The Official Guide to Learning OpenGL, Versions 3.0 and 3.1","9780321552624","Addison-Wesley Professional","2009-07-01","0","1,","Default,","0","7th Edition","885","","59,99","0","","","","Paperback","0","","","This seventh edition of the bestselling ""red book"" describes the latest features of OpenGL Versions 3.0 and 3.1. Users will find clear explanations of OpenGL functionality and many basic computer graphics techniques.","","English","2017-02-18 10:25:33","0","0000-00-00","2017-02-18 10:25:33","e01f2c9f2d49feb2d97d378e9fdb695e",
+"134","Stroustrup, Bjarne","Tour of C++, A","9780321958310","Addison-Wesley Professional","2013-10-03","0","1,","Default,","0","C++ In-Depth|C++ In-Depth Series","192","","34,99","0","","","","Paperback","0","","","The C++11 standard allows programmers to express ideas more clearly, simply, and directly, and to write faster, more efficient code. Bjarne Stroustrup, the designer and original implementer of C++, thoroughly covers the details of this language and its use in his definitive reference, <i>The C++ Programming Language, Fourth Edition</i>. In <b> <i>A Tour of C++</i> </b>, Stroustrup excerpts the overview chapters from that complete reference, expanding and enhancing them to give an experienced programmer-in just a few hours-a clear idea of what constitutes modern C++. In this concise, self-contained guide, Stroustrup covers most major language features and the major standard-library components-not, of course, in great depth, but to a level that gives programmers a meaningful overview of the language, some key examples, and practical help in getting started. Stroustrup presents the C++ features in the context of the programming styles they support, such as object-oriented and generic programming. His tour is remarkably comprehensive. Coverage begins with the basics, then ranges widely through more advanced topics, including many that are new in C++11, such as move semantics, uniform initialization, lambda expressions, improved containers, random numbers, and concurrency. The tour ends with a discussion of the design and evolution of C++ and the extensions added for C++11. This guide does not aim to teach you how to program (see Stroustrup's <i>Programming: Principles and Practice Using C++ </i>for that); nor will it be the only resource you'll need for C++ mastery (see Stroustrup's <i>The C++ Programming Language, Fourth Edition</i>, for that). If, however, you are a C or C++ programmer wanting greater familiarity with the current C++ language, or a programmer versed in another language wishing to gain an accurate picture of the nature and benefits of modern C++, you can't find a shorter or simpler introduction than this tour provides.","Computers / Programming Languages / C","English","2017-02-18 10:25:46","0","0000-00-00","2017-02-18 10:25:46","7b507ed8af55dce3e5c7bb517e049ebd",
+"135","Levitin, Anany V.|Levitin, Anany","Introduction to the Design and Analysis of Algorithms","9780321358288","Addison Wesley","2006-02-24","0","1,","Default,","0","2nd Edition","592","","122,00","0","","","","Paperback","0","","","Based on a Based on a new classification of algorithm design techniques and a clear delineation of analysis methods, Introduction to the Design and Analysis of Algorithms presents the subject in a coherent and innovative manner. Written in a student-friendly style, the book emphasizes the understanding of ideas over excessively formal treatment while thoroughly covering the material required in an introductory algorithms course. Popular puzzles are used to motivate students' interest and strengthen their skills in algorithmic problem solving. Other learning-enhancement features include chapter summaries, hints to the exercises, and a detailed solution manual.","Computers / Programming / Algorithms","English","2017-02-18 10:25:58","0","0000-00-00","2017-02-18 10:25:58","9a89e58417c91f5d3826379f2d103ead",
+"136","Abelson, Harold|Sussman, Gerald Jay","Structure and Interpretation of Computer Programs","9780262011532","MIT Press","1996-07-25","0","1,","Default,","0","MIT Electrical Engineering and Computer Science","657","","86,00","0","","","","Hardcover","0","","","Structure and Interpretation of Computer Programs has had a dramatic impact on computer science curricula over the past decade. This long-awaited revision contains changes throughout the text. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published. A new theme has been introduced that emphasizes the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming and lazy evaluation, and nondeterministic programming. There are new example sections on higher-order procedures in graphics and on applications of stream processing in numerical programming, and many new exercises. In addition, all the programs have been reworked to run in any Scheme implementation that adheres to the IEEE standard.","Computers / Software Development & Engineering / General","English","2017-02-18 10:26:07","0","0000-00-00","2017-02-18 10:26:07","e42b4442ba874c80b89b0c9493fae315",
+"137","Laurent, Andrew M. St.|Laurent, Andrew","Understanding Open Source and Free Software Licensing","9780596005818","O'Reilly Media","2004-08-23","0","1,","Default,","0","","208","","34,99","0","","","","Paperback","0","","","If you've held back from developing open source or free software projects because you don't understand the implications of the various licenses, you're not alone. Many developers believe in releasing their software freely, but have hesitated to do so because they're concerned about losing control over their software. Licensing issues are complicated, and both the facts and fallacies you hear word-of-mouth can add to the confusion.<br /><br /><i>Understanding Open Source and Free Software Licensing</i> helps you make sense of the different options available to you. This concise guide focuses on annotated licenses, offering an in-depth explanation of how they compare and interoperate, and how license choices affect project possibilities. Written in clear language that you don't have to be a lawyer to understand, the book answers such questions as: What rights am I giving up? How will my use of OS/FS licensing affect future users or future developers? Does a particular use of this software--such as combining it with proprietary software--leave me vulnerable to lawsuits?<br /><br />Following a quick look at copyright law, contracts, and the definition of ""open source,"" the book tackles the spectrum of licensing, including:<br /><br /><br />The MIT (or X), BSD, Apache and Academic Free licenses The GPL, LGPL, and Mozilla licenses The QT, Artistic, and Creative Commons licenses Classic Proprietary licenses Sun Community Source license and Microsoft Shared Source project<br />The book wraps up with a look at the legal effects--both positive and negative--of open source/free software licensing.Licensing is a major part of what open source and free software are all about, but it's still one of the most complicated areas of law. Even the very simple licenses are tricky. <i>Understanding Open Source and Free Software Licensing</i> bridges the gap between the open source vision and the practical implications of its legal underpinnings. If open source and free software licenses interest you, this book will help you understand them. If you're an open source/free software developer, this book is an absolute necessity.","Computers / Social Aspects / General","English","2017-02-18 10:26:19","0","0000-00-00","2017-02-18 10:26:19","fc243f45d8b7a59992678674f07937ea",
+"138","Munroe, Randall","What If?: Serious Scientific Answers to Absurd Hypothetical Questions","9781848549579","John Murray","2014-09-04","0","1,","Default,","0","","336","","","0","","","","Hardcover","0","","","Randall Munroe left NASA in 2005 to start up his hugely popular site XKCD 'a web comic of romance, sarcasm, math and language' which offers a witty take on the world of science and geeks. It now has 600,000 to a million page hits daily. Every now and then, Munroe would get emails asking him to arbitrate a science debate. 'My friend and I were arguing about what would happen if a bullet got struck by lightning, and we agreed that you should resolve it . . . ' He liked these questions so much that he started up <i>What If</i>. <br /><br /><b>If your cells suddenly lost the power to divide, how long would you survive?</b><br /><br /><b> How dangerous is it, really, to be in a swimming pool in a thunderstorm?</b><br /><br /><b> If we hooked turbines to people exercising in gyms, how much power could we produce?</b><br /><br /><b> What if everyone only had one soulmate?</b><br /><br /><b>When (if ever) did the sun go down on the British empire? </b><br /><br /><b> How fast can you hit a speed bump while driving and live?</b><br /><br /><b>What would happen if the moon went away?</b><br /><br />In pursuit of answers, Munroe runs computer simulations, pores over stacks of declassified military research memos, solves differential equations, and consults with nuclear reactor operators. His responses are masterpieces of clarity and hilarity, studded with memorable cartoons and infographics. They often predict the complete annihilation of humankind, or at least a really big explosion. Far more than a book for geeks, <i>WHAT IF: Serious Scientific Answers to Absurd Hypothetical Questions</i> explains the laws of science in operation in a way that every intelligent reader will enjoy and feel much the smarter for having read.","","English","2017-02-18 10:26:29","0","0000-00-00","2017-02-18 10:26:29","aea07e35b4a17a5e90771212195ec655",
+"139","Aho, Alfred V.|Lam, Monica S.|Sethi, Ravi|Ullman, Jeffrey D.","Compilers: Principles, Techniques, and Tools","9780321486813","Addison Wesley","2006-08-01","0","1,","Default,","0","2nd Edition","1009","","190,80","0","","","","Hardcover","0","","","<i>Compilers: Principles, Techniques and Tools</i>, known to professors, students, and developers worldwide as the ""Dragon Book,"" is available in a new edition. Every chapter has been completely revised to reflect developments in software engineering, programming languages, and computer architecture that have occurred since 1986, when the last edition published. The authors, recognizing that few readers will ever go on to construct a compiler, retain their focus on the broader set of problems faced in software design and software development.","Computers / Systems Architecture / General","English","2017-02-18 10:26:38","0","0000-00-00","2017-02-18 10:26:38","5cb1bc7f1b0cc6059fa84009dc34b5c8",
+"140","Yaghmour, Karim|Masters, Jon|Ben-Yossef, Gilad|Gerum, Philippe","Building Embedded Linux Systems","9780596529680","O'Reilly Media","2008-08-22","0","1,","Default,","0","","464","","49,99","0","","","","Paperback","0","","","There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. <i>Building Embedded Linux Systems</i> offers an in-depth, hard-core guide to putting together embedded systems based on Linux.<br /><br /> Updated for the latest version of the Linux kernel, this new edition gives you the basics of building embedded Linux systems, along with the configuration, setup, and use of more than 40 different open source and free software packages in common use. The book also looks at the strengths and weaknesses of using Linux in an embedded system, plus a discussion of licensing issues, and an introduction to real-time, with a discussion of real-time options for Linux.<br /><br /> This indispensable book features arcane and previously undocumented procedures for:<br /><br /><br />Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target-specific kernel Creating a complete target root filesystem Setting up, manipulating, and using solid-state storage devices Installing and configuring a bootloader for the target Cross-compiling a slew of utilities and packages Debugging your embedded system using a plethora of tools and techniques Using the uClibc, BusyBox, U-Boot, OpenSSH, thttpd, tftp, strace, and gdb packages By presenting how to build the operating system components from pristine sources and how to find more documentation or help, <i>Building Embedded Linux Systems</i> greatly simplifies the task of keeping complete control over your embedded operating system.<br /><br />","","English","2017-02-18 10:26:46","0","0000-00-00","2017-02-18 10:26:46","3d1e9f65612c8dda3b1bd5ee2abe0f77",
+"141","Tarjan, Robert Endre","Data Structures and Network Algorithms","0898711878","Society for Industrial and Applied Mathematics (SIAM)","1987-01-01","0","1,","Default,","0","","140","","","0","","","","Paperback","0","","","There has been an explosive growth in the field of combinatorial algorithms. These algorithms depend not only on results in combinatorics and especially in graph theory, but also on the development of new data structures and new techniques for analyzing algorithms. Four classical problems in network optimization are covered in detail, including a development of the data structures they use and an analysis of their running time. Data Structures and Network Algorithms attempts to provide the reader with both a practical understanding of the algorithms, described to facilitate their easy implementation, and an appreciation of the depth and beauty of the field of graph algorithms.","Mathematics / Discrete Mathematics","","2017-02-18 10:27:26","0","0000-00-00","2017-02-18 10:27:26","4bd9e0030f7ae3c3e82199e7967c959d",
+"142","Munroe, Randall","xkcd: volume 0","9780615314464","Breadpig","2010-08-24","0","1,","Default,","0","","120","","18,00","0","","","","Paperback","0","","","Randall Munroe describes <i>xkcd</i> as a webcomic of romance, sarcasm, math, and language. While it's practically required reading in the geek community, <i>xkcd</i> fans are as varied as the comic's subject matter. This book creates laughs from science jokes on one page to relationship humor on another.<br /><br /><i>xkcd: volume 0</i> is the first book from the immensely popular webcomic with a passionate readership (just Google ""xkcd meetup"").<br /><br />The artist selected personal and fan favorites from his first 600 comics. It was lovingly assembled from high-resolution original scans of the comics (the mouseover text is discreetly included), and features a lot of doodles, notes, and puzzles in the margins.<br /><br />The book is published by Breadpig, which donates all of the publisher profits from this book to Room to Read for promoting literacy in the developing world.","Humor / Form / Comic Strips & Cartoons","English","2017-02-18 10:27:43","0","0000-00-00","2017-02-18 10:27:43","3cd734074dcfc27971815947af9ea53c",
+"143","Nordling, Carl|Österman, Jonny|Osterman, J.","Physics Handbook for Science and Engineering","9789144044538","Studentlitteratur","2006-02-01","0","1,","Default,","0","","504","","38,30","0","","","","Hardcover","0","","","Here at last is a single volumn which summarizes the entire world of physics, allowing you to locate any data and formulae quickly. Clearly presented. Extensively indexed. Tables show nuclear data, including binding energy, half-life, fission product yields, cross-sections, decay modes, decay energies of numerous nuclides and more.","Science / Physics / General","English","2017-02-18 10:28:57","0","0000-00-00","2017-02-18 10:28:57","190075f3bd656da66e09d264ab96f01e",
+"144","Öhrlund, Dag|Hellqvist, Per","Skydda ditt barn på Internet","9789153431145","Ica Bokförlag","2008-08-12","0","1,","Default,","0","","182","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:29:29","0","0000-00-00","2017-02-18 10:29:29","c868e572329404e2497a3c3b1e336973",
+"145","Hahn, Harley|Stout, Rick","Internet Yellow Pages, The","9780078820236","Osborne Publishing","1994-04-01","0","1,","Default,","0","","447","","27,95","0","","","","Paperback","0","","","Hahn and Stout, two of the Internet's foremost authorities, have created this unique directory--unmatched in scope and organization--that shows users how to access thousands of free Internet resources from all over the world.","Technology & Engineering / Telecommunications","English","2017-02-18 10:29:57","0","0000-00-00","2017-02-18 10:29:57","7b7bbef4e19a51fc1cd61b7882bde7d7",
+"146","Stroustrup, Bjarne","Design and Evolution of C++, The","9780201543308","Addison-Wesley Professional","1994-04-08","0","1,","Default,","0","","480","","69,99","0","","","","Paperback","0","","","This book focuses on the principles, processes and decisions made during the development of the C++ programming language. As the inventor of the language, Stroustrup presents his insight into the decisions which resulted in the features of C++ - the praised, the controversial and even some of the rejected ones. By writing this book the author presents his object-oriented programming philosophy to the interested programming community. His vehicle is the C++ language but his focus is on real object-oriented programming language development for the working programmer rather than as a abstract approach to the OOP paradigm.","","English","2017-02-18 10:30:13","0","0000-00-00","2017-02-18 10:30:13","98fe2763626fc285d18601a984e34a22",
+"147","Davidson, Ben J.","Skateboard Book, The","0448125919","Grosset & Dunlap","1976","0","1,","Default,","0","","109","","","0","","","","Paperback","0","","","Discusses skateboard selection, maintenance, safety, and freestyle tricks.","","English","2017-02-18 10:30:58","0","0000-00-00","2017-02-18 10:30:58","db00467313a3fc6aa0b1c33aab57ccc2",
+"148","Slatalla, Michelle|Quittner, Joshua|Slatalla, Michele","Masters of Deception: The Gang That Ruled Cyberspace","9780060926946","Harper Perennial","1995-01-01","0","1,","Default,","0","","240","","16,99","0","","","","Paperback","0","","","The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. ""An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace.""--<em>Glamour</em>","Technology & Engineering / General","English","2017-02-18 10:31:32","0","0000-00-00","2017-02-18 10:31:32","886df872f24a5eae3015e2bf2444a798",
+"149","Glickstein, Bob","Writing GNU Emacs Extensions","9781565922617","O'Reilly Media","1997-04-08","0","1,","Default,","0","","240","","32,95","0","","","","Paperback","0","","","Yes, it is possible to be all things to all people, if you're talking about the Emacs editor. As a user, you can make any kind of customization you want, from choosing the keystrokes that invoke your favorite commands to creating a whole new work environment that looks like nothing ever developed before. It's all in Emacs Lisp -- and in this short but fast-paced book.<br /><br />GNU Emacs is more than an editor; it's a programming environment, a communications package, and many other things. To provide such a broad range of functions, it offers a full version of the Lisp programming language -- something much more powerful than the little macro languages provided in other editors (including older versions of Emacs). GNU Emacs is a framework in which you can create whole new kinds of editors or just alter aspects of the many functions it already provides.<br /><br />In this book, Bob Glickstein delves deep into the features that permit far-reaching Emacs customizations. He teaches you the Lisp language and discusses Emacs topics (such as syntax tables and macro templates) in easy-to-digest portions. Examples progress in complexity from simple customizations to extensive major modes.<br /><br />You will learn how to write interactive commands, use hooks and advice, perform error recovery, manipulate windows, buffers, and keymaps, exploit and alter Emacs's main loop, and more. Each topic is explored through realistic examples and a series of successive refinements that illustrate not only the Emacs Lisp language, but the development process as well, making learning pleasant and natural.","Computers / Operating Systems / UNIX","English","2017-02-18 10:31:41","0","0000-00-00","2017-02-18 10:31:41","053dc02b7cde1f59dc1839b83b086aed",
+"150","Levine, John R.|Mason, Tony|Brown, Doug|Levine, John","Lex & Yacc","9781565920002","O'Reilly Media","1992-10-08","0","1,","Default,","0","","388","","29,95","0","","","","Paperback","0","","","This book shows you how to use two Unix utilities, <i>lex</i> and <i>yacc,</i> in program development. These tools help programmers build compilers and interpreters, but they also have a wider range of applications.<br /><br />The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users. This edition is twice the size of the first and has an expanded index.<br /><br />The following material has been added:<br /><br /><br />Each utility is explained in a chapter that covers basic usage and simple, stand-alone applications How to implement a full SQL grammar, with full sample code Major MS-DOS and Unix versions of <i>lex</i> and <i>yacc</i> are explored in depth, including AT&amp;T <i>lex</i> and <i>yacc</i>, Berkeley <i>yacc</i>, Berkeley/GNU Flex, GNU Bison, MKS <i>lex</i> and <i>yacc</i>, and Abraxas PCYACC","Computers / Operating Systems / UNIX","English","2017-02-18 10:31:50","0","0000-00-00","2017-02-18 10:31:50","a8efe791a1051ceec4c13fcd581f1eed",
+"151","Gamma, Erich|Johnson, Ralph|Vlissides, John|Helm, Richard","Design Patterns: Elements of Reusable Object-Oriented Software","9780201633610","Addison-Wesley Professional","1994-11-10","0","1,","Default,","0","","416","","59,99","0","","","","Hardcover","0","","","Capturing a wealth of experience about the design of object-oriented software, four top-notch designers present a catalog of simple and succinct solutions to commonly occurring design problems. Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves.<br /><br />The authors begin by describing what patterns are and how they can help you design object-oriented software. They then go on to systematically name, explain, evaluate, and catalog recurring designs in object-oriented systems. With Design Patterns as your guide, you will learn how these important patterns fit into the software development process, and how you can leverage them to solve your own design problems most efficiently.<p> Each pattern describes the circumstances in which it is applicable, when it can be applied in view of other design constraints, and the consequences and trade-offs of using the pattern within a larger design. All patterns are compiled from real systems and are based on real-world examples. Each pattern also includes code that demonstrates how it may be implemented in object-oriented programming languages like C++ or Smalltalk.</p>","Computers / Programming / Object Oriented","English","2017-02-18 10:32:02","0","0000-00-00","2017-02-18 10:32:02","8c6080a8938cf8a4f8f4154140c960af",
+"152","Foley, James D.|Dam, Andries van|Feiner, Steven K.|Hughes, John F.","Computer Graphics: Principles and Practice","0201121107","Addison Wesley Publishing Company","1990-06-01","0","1,","Default,","0","","1174","","69,95","0","","","","Hardcover","0","","","The long-awaited second edition of this book has been completely rewritten to provide the most comprehensive authoritative and up-to-date coverage of the field---making it the standard computer graphics reference work for the 1990s. The authors provide a unique combination of current concepts and practical applications. The important algorithms in 2D and 3D graphics are detailed for easy implementation.","Computers / Programming Languages / General","English","2017-02-18 10:32:57","0","0000-00-00","2017-02-18 10:32:57","a0da847640244a1a70ff0766c23fc82d",
+"153","Zimmer, Vincent|Rothman, Michael|Marisetty, S.|Marisetty, Suresh","Beyond BIOS: Developing with the Unified Extensible Firmware Interface 2nd Edition","9781934053294","Intel Press","2011-01-19","0","1,","Default,","0","","396","","","0","","","","Paperback","0","","","This book provides an overview of modern boot firmware, including the Unified Extensible Firmware Interface (Uefi) and its associated Efi Developer Kit Ii (Edkii) firmware. The authors have each made significant contributions to developments in these areas. The reader will learn to use the latest developments in Uefi on modern hardware, including open source firmware and open hardware designs. The book begins with an exploration of interfaces exposed to higher-level software and operating systems, and commences to the left of the boot timeline, describing the flow of typical systems, beginning with the machine restart event. Software engineers working with Uefi will benefit greatly from this book, while specific sections of the book address topics relevant for a general audience: system architects, pre-operating-system application developers, operating system vendors (loader, kernel), independent hardware vendors (such as for plug-in adapters), and developers of end-user applications. As a secondary audience, project technical leaders or managers may be interested in this book to get a feel for what their engineers are doing. The reader will find: * An overview of Uefi and underlying Platform Initialization (Pi) specifications * How to create Uefi applications and drivers * Workflow to design the firmware solution for a modern platform * Advanced usages of Uefi firmware for security and manageability","","English","2017-02-18 10:33:15","0","0000-00-00","2017-02-18 10:33:15","5fb71bf341f9f3c5312701530851122f",
+"154","Newham, Cameron|Rosenblatt, Bill","Learning the bash Shell","9780596009656","O'Reilly Media","1995-10-08","0","1,","Default,","0","O'Reilly)","333","","34,95","0","","","","Paperback","0","","","<div><p>O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop <i>Learning the bash Shell</i> has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell.As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what <i>Learning the bash Shell</i> provides.If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. <i>Learning the bash Shell</i> is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn:</p><ul><li>How to install bash as your login shell</li><li>The basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobs</li><li>Command line editing, history substitution, and key bindings</li><li>How to customize your shell environment without programming</li><li>The nuts and bolts of basic shell programming, flow control structures, command-line options and typed variables</li><li>Process handling, from job control to processes, coroutines and subshells</li><li>Debugging techniques, such as trace and verbose modes</li><li>Techniques for implementing system-wide shell customization and features related to system security</li></ul></div>","Computers / Programming Languages / General","English","2017-02-18 10:33:24","0","0000-00-00","2017-02-18 10:33:24","39ec052e4e4e53003e58e7cab181abe3",
+"155","Faulkner, Eric|Northrup, Tony|Northrup, Anthony","Home Hacking Projects for Geeks","9780596004057","O'Reilly Media","2004-12-23","0","1,","Default,","0","Hacks","336","","29,95","0","","","","Paperback","0","","","<div><p>Take a geek and a PC, add one soldering iron, a home, and a copy of <i>Home Hacking Projects for Geeks</i>, and you'll give new meaning to the term, ""home improvement."" From fearless neophytes to tool-wielding masterminds, the home hacker in any geek will find new inspiration and plenty of hands-on guidance to take on a variety of home-transforming projects once relegated to the world of sci-fi.</p><p>This fun new guide combines creativity with electricity and power tools to achieve cool--and sometimes even practical--home automation projects. Never again will you have to flip a light switch when you enter a room or use a key to open your front door. With a few off-the-shelf devices, some homemade hardware, and a little imagination, you can be living in your own high-tech habitat.</p><p><i>Home Hacking Projects for Geeks</i> shows hackers of all ability levels how to take on a wide range of projects, from the relatively small but energy-conscious automating of light switches, to building home theaters using Windows or Linux-based PCs, to more complicated projects like building home security systems that rival those offered by professional security consultants. Each project includes a conceptual diagram, a ""What You Need List"" and a small ""Project Stats"" section that describes the relative difficulty, time involved, and cost of the project. What's more, each project is a workable, practical way to improve your home--something unique that you can customize for your individual needs.</p><p>The thirteen projects in <i>Home Hacking Projects for Geeks</i> are divided into three categories: Home Automation, Home Entertainment Systems, and Security, and include projects such as:</p> Remotely Monitor Your Pet Make Your House Talk Remotely Control Your Computer's MP3 player Create Time-Shifted FM Radio Watch Your House Across the Network Build a Home Security System If you've ever thought the Jetsons had it made, or looked around your house and thought, ""I could make that better "" then you're ready for <i>Home Hacking Projects for Geeks</i>.</div>","House & Home / Do-It-Yourself / Electrical","English","2017-02-18 10:33:48","0","0000-00-00","2017-02-18 10:33:48","c7e6b6f6ad90ca151e293167293c0a3c",
+"156","Arvola, Mattias","Interaktionsdesign och UX : om att skapa en god användarupplevelse","9789144097640","Studentlitteratur","2014-10-09","0","1,","Default,","0","","168","","","0","","","","Paperback","0","","","Interaktionsdesign och UX handlar om tekniker för att utforma nyskapande interaktiva produkter och tjänster med god användarupplevelse. God användarupplevelse, eller UX (eng. user experience), är det övergripande målet för designarbetet. Den här boken är tänkt som ett praktiskt stöd under hela designprocessen: från initiala insikter och formulerade avsikter, till konceptidéer och test av prototyper. Tyngdpunkten ligger på de tidiga faserna där designens inriktning slås fast. <br /><br />Boken vänder sig till yrkesverksamma som vill lära sig nya tekniker och arbetssätt, och till studenter som ska arbeta konkret med design av interaktiva produkter och tjänster.","","Swedish","2017-02-18 10:33:59","0","0000-00-00","2017-02-18 10:33:59","08bd9c2232f4918ecd1a75f9cb6344d6",
+"157","Sonmez, John Z.|Sonmez, John","Soft Skills","9781617292392","Manning Publications","2014-12-01","0","1,","Default,","0","","470","","34,99","0","","","","Paperback","0","","","Soft Skills: The software developer's life manual is a unique guide, offering techniques and practices for a more satisfying life as a professional software developer. In it, developer and life coach John Sonmez addresses a wide range of important ""soft"" topics, from career and productivity to personal finance and investing, and even fitness and relationships, all from a developer-centric viewpoint.","Self-Help / Personal Growth / Success","English","2017-02-18 10:34:15","0","0000-00-00","2017-02-18 10:34:15","ce8adcb9cf4d42977a300aaed1d3f2da",
+"158","McDowell, Gayle Laakmann","Cracking the Coding Interview: 189 Programming Questions and Solutions","9780984782857","Careercup","2015-07-01","0","1,","Default,","0","","708","","39,95","0","","","","Paperback","0","","","I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on a whiteboard. I've been through this as a candidate and as an interviewer.<br /><br /><i>Cracking the Coding Interview, 6th Edition</i> is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.<br /><br />Learn how to uncover the hints and hidden details in a question, discover how to break down a problem into manageable chunks, develop techniques to unstick yourself when stuck, learn (or re-learn) core computer science concepts, and practice on 189 interview questions and solutions.<br /><br />These interview questions are real; they are not pulled out of computer science textbooks. They reflect what's truly being asked at the top companies, so that you can be as prepared as possible. <b>WHAT'S INSIDE?</b><br />• 189 programming interview questions, ranging from the basics to the trickiest algorithm problems.<br />• A walk-through of how to derive each solution, so that you can learn how to get there yourself.<br />• Hints on how to solve each of the 189 questions, just like what you would get in a real interview.<br />• Five proven strategies to tackle algorithm questions, so that you can solve questions you haven't seen.<br />• Extensive coverage of essential topics, such as big O time, data structures, and core algorithms.<br />• A behind the scenes look at how top companies like Google and Facebook hire developers.<br />• Techniques to prepare for and ace the soft side of the interview: behavioral questions.<br />• For interviewers and companies: details on what makes a good interview question and hiring process.","Computers / Software Development & Engineering / General","English","2017-02-18 10:34:24","0","0000-00-00","2017-02-18 10:34:24","9e509d2225f9b68efc90b8192fd6bb10",
+"159","McKusick, Marshall Kirk|Bostic, Keith|Karels, Michael J.|Quarterman, John S.","Design and Implementation of the 4.4 BSD Operating System, The","9780201549799","Addison-Wesley Professional","1996-04-30","0","1,","Default,","0","","608","","74,99","0","","","","Hardcover","0","","","Describes the design and implementation of the BSD operating system - previously known as the Berkeley version of UNIX. This book explains key design decisions, and also details the concepts, data structures, and algorithms used in implementing the system's facilities.","","English","2017-02-18 10:34:59","0","0000-00-00","2017-02-18 10:34:59","0e5bfdd5647205aa297c8d4d3516e098",
+"160","Silberschatz, Abraham|Galvin, Peter Baer|Gagne, Greg|19, ","Operating System Concepts","9781118093757","Wiley","2013-05","0","1,","Default,","0","","848","","","0","","","","Paperback","0","","","Operating System Concepts, now in its ninth edition, continues to provide a solid theoretical foundation for understanding operating systems. The ninth edition has been thoroughly updated to include contemporary examples of how operating systems function. The text includes content to bridge the gap between concepts and actual implementations. End-of-chapter problems, exercises, review questions, and programming exercises help to further reinforce important concepts. A new Virtual Machine provides interactive exercises to help engage students with the material.","","English","2017-02-18 10:35:09","0","0000-00-00","2017-02-18 10:35:09","618bf06fa2eee8d99569aa06c925683b",
+"161","Hsu, Hwei P.|Hsu, Hwei","Schaum's Outline of Signals and Systems","0070306419","McGraw-Hill","1995-03-01","0","1,","Default,","0","","470","","21,95","0","","","","Paperback","0","","","<p><b>Confusing Textbooks?</b></p> <p><b>Missed Lectures? </b></p> <p><b>Tough Test Questions? </b></p> <p>Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills. </p> <p><b>This Schaum's Outline gives you</b></p> <ul> <li>Practice problems with full explanations that reinforce knowledge <li>Coverage of the most up-to-date developments in your course field <li>In-depth review of practices and applications </ul> <p>Fully compatible with your classroom text, Schaum's highlights all the important facts you need to know. Use Schaum's to shorten your study time-and get your best test scores!</p> <p>Schaum's Outlines-Problem Solved.</p>","Technology / Engineering / Electrical","English","2017-02-18 10:36:04","0","0000-00-00","2017-02-18 10:36:04","6f6c24ff7107249a7c04fe4748b47b3a",
+"162","Hatch, Brian|Lee, James|Kurtz, George","Hacking Linux Exposed: Linux Security Secrets & Solutions","9780072225648","McGraw-Hill Osborne Media","2001-03-27","0","1,","Default,","0","","712","","49,99","0","","","","Paperback","0","","","<b>The Barnes &amp; Noble Review</b><br />Remember when people used to say Linux was inherently secure because all bugs are shallow, including security bugs -- and, anyhow, the black hats only hate Microsoft? Yeah, right! Unfortunately, you <i>do</i> need <i>Hacking Linux Exposed, Second Edition</i>. <br /><p><br />Authors Brian Hatch and James Lee have added 200 pages of new content to this edition -- and they ve overhauled everything else to reflect the latest Linux exploits, cracking tools, and countermeasures. To help you set priorities on defense, every exploit is rated from 0 to 10 on popularity, simplicity, impact, and overall risk. <br /></p><p><br />We found the sections on break-ins particularly useful. You ll find everything here from Mitnick-ian social engineering to physical and network attacks. For example, you probably know that systems running LILO are susceptible to being booted to single-user mode without passwords; you may not realize that newer systems using GRUB have their own vulnerabilities. Hatch and Lee offer countermeasures for <i>both</i>. <br /></p><p><br />You ll learn how to prevent insecure program execution, buffer overflows, race conditions, and symlink attacks; how to validate user input; and how to create temporary files securely. There are updated chapters on email and FTP security; web servers and dynamic content; and denial-of-service attacks. <br /></p><p><br />There s also an entirely new three-chapter section on what crackers do <i>after</i> they ve broken in. You ll learn how they cover their tracks -- from removing log entries through replacing your binaries with versions that don t betray their presence. There s a detailed chapter on backdoors, and another on kernel changes and other advanced methods for hiding one s activities. If you re running Linux for anything that matters, this book s a must. <i>Bill Camarda</i></p><p><i>Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include</i> <a href=""http://search.barnesandnoble.com/booksearch/isbninquiry.asp?isbn=0789718529"" rel=""nofollow"">Special Edition Using Word 2000</a> <i>and</i> <a href=""http://cart2.barnesandnoble.com/booksearch/isbninquiry.asp?isbn=0764505424"" rel=""nofollow"">Upgrading &amp; Fixing Networks for Dummies, Second Edition</a>.</p>","Computers / Security / General","English","2017-02-18 10:36:33","0","0000-00-00","2017-02-18 10:36:33","fabe3e23b6e7a8b02a98203655c27883",
+"163","Armstrong, Joe","Programming Erlang","9781934356005","Pragmatic Bookshelf","2007-07-18","0","1,","Default,","0","","519","","36,95","0","","","","Paperback","0","","","Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.<br /><br />Moore's Law is the observation that the amount you can do on a single chip doubles every two years. But Moore's Law is taking a detour. Rather than producing faster and faster processors, companies such as Intel and AMD are producing multi-core devices: single chips containing two, four, or more processors. If your programs aren't concurrent, they'll only run on a single processor at a time. Your users will think that your code is slow.<br /><br />Erlang is a programming language designed for building highly parallel, distributed, fault-tolerant systems. It has been used commercially for many years to build massive fault-tolerated systems that run for years with minimal failures.<br /><br />Erlang programs run seamlessly on multi-core computers: this means your Erlang program should run a lot faster on a 4 core processor than on a single core processor, all without you having to change a line of code.<br /><br />Erlang combines ideas from the world of functional programming with techniques for building fault-tolerant systems to make a powerful language for building the massively parallel, networked applications of the future.<br /><br />This book presents Erlang and functional programming in the familiar Pragmatic style. And it's written by Joe Armstrong, one of the creators of Erlang.<br /><br />It includes example code you'll be able to build upon. In addition, the book contains the full source code for two interesting applications:<br /><br /><br /><br />A SHOUTcast server which you can use to stream music to every computer in your house, and a full-text indexing and search engine that can index gigabytes of data. Learn how to write programs that run on dozens or even hundreds of local and remote processors. See how to write robust applications that run even in the face of network and hardware failure, using the Erlang programming language.","Computers / Client-Server Computing","English","2017-02-18 10:36:48","0","0000-00-00","2017-02-18 10:36:48","02fe9ff281bd9a75d40cb075155ecf59",
+"164","Lipovača, Miran","Learn You a Haskell for Great Good!: A Beginner's Guide","9781593272838","No Starch Press","2011-04-18","0","1,","Default,","0","","376","","44,95","0","","","","Paperback","0","","","<p><i>Learn You a Haskell for Great Good!</i> is a fun, illustrated guide to learning Haskell, a functional programming language that's growing in popularity. <i>Learn You a Haskell for Great Good!</i> introduces programmers familiar with imperative languages (such as C++, Java, or Python) to the unique aspects of functional programming. Packed with jokes, pop culture references, and the author's own hilarious artwork, <i>Learn You a Haskell for Great Good!</i> eases the learning curve of this complex language, and is a perfect starting point for any programmer looking to expand his or her horizons. The well-known web tutorial on which this book is based is widely regarded as the best way for beginners to learn Haskell, and receives over 30,000 unique visitors monthly.</p>","COMPUTERS / Programming Languages / C#","English","2017-02-18 10:37:00","0","0000-00-00","2017-02-18 10:37:00","aab30a760c359af65b329a91a85dca5d",
+"165","Smith, Chris","Programming F#: A comprehensive guide for writing simple code to solve complex problems","9780596153649","O'Reilly Media","2009-10-20","0","1,","Default,","0","Animal Guide","410","","44,99","0","","","","Paperback","0","","","Why learn F#? This multi-paradigm language not only offers you an enormous productivity boost through functional programming, it also lets you develop applications using your existing object-oriented and imperative programming skills. With <i>Programming F#</i>, you'll quickly discover the many advantages of Microsoft's new language, which includes access to all the great tools and libraries of the .NET platform.<br /><br /> Learn how to reap the benefits of functional programming for your next project -- whether it's quantitative computing, large-scale data exploration, or even a pursuit of your own. With this comprehensive guide, F# team member Chris Smith gives you a head start on the fundamentals and advanced concepts of the F# language.<br /><br /><br />Get a clear understanding of functional programming, and how you can use it to simplify code<br />Gain a solid understanding of the language's core syntax, including object-oriented and imperative styles<br />Simplify concurrent and parallel programming with F# Asynchronous Workflows and the Parallel Extensions to .NET<br />Learn advanced F# concepts, such as quotations and computation expressions<br /><br /><br /><br /> ""This book emphasizes simple, clear explanations of the foundational elements of F#, always with an eye on the enjoyment that comes from programming in general, and programming with F# in particular."" <i>Don Syme, Principal Researcher and F# Designer, Microsoft Research</i>","","English","2017-02-18 10:37:16","0","0000-00-00","2017-02-18 10:37:16","7a7e2da68618454751869a0aa1b577d1",
+"166","Svensson, Tomas|Krysander, Christian","Projektmodellen LIPS","9789144075259","Studentlitteratur","2011-08-24","0","1,","Default,","0","","151","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:37:30","0","0000-00-00","2017-02-18 10:37:30","f0fdf2b48002dbdb347dc41a7cd839b7",
+"167","Hofmann, Helga","Kattens språk : förstå din katt","9789153427070","Ica Bokförlag","2006-04-19","0","1,","Default,","0","Djur hemma","65","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:37:43","0","0000-00-00","2017-02-18 10:37:43","4a8fc3d03d11510b012b40608fecd0df",
+"168","Salzman, Peter Jay|Pomerantz, Ori|Burian, Michael","Linux Kernel Module Programming Guide, The","9781441418869","Createspace","2009-01-05","0","1,","Default,","0","","88","","15,95","0","","","","Paperback","0","","","Linux Kernel Module Programming Guide is for people who want to write kernel modules. It takes a hands-on approach starting with writing a small ""hello, world"" program, and quickly moves from there. Far from a boring text on programming, Linux Kernel Module Programming Guide has a lively style that entertains while it educates. An excellent guide for anyone wishing to get started on kernel module programming. *** Money raised from the sale of this book supports the development of free software and documentation.","Computers / Operating Systems / Linux","English","2017-02-18 10:37:56","0","0000-00-00","2017-02-18 10:37:56","dea3646e5440e1bec439e8e43a4aa4c8",
+"169","Jones, M. Tim","GNU/Linux Application Programming","9781584505686","Charles River Media","2005-02-02","0","1,","Default,","0","Programming Series","688","","54,99","0","","","","Paperback","0","","","GNU/Linux is the Swiss army knife of operating systems. You'll find it in the smallest devices (such as an Apple iPod) to the largest most powerful supercomputers (like IBM's Blue Gene). You'll also find GNU/Linux running on the most diverse architectures, from the older x86 processors to the latest cell processor that powers the PlayStation 3 console. GNU/Linux Application Programming, Second Edition gets you up and running developing applications on the GNU/Linux operating system, whether you're interested in creating applications for an iPod or a Blue Gene. This completely updated edition covers all the necessary tools and techniques with many examples illustrating the use of GNU/Linux APIs. Split into fi ve distinct parts, the book covers GNU tools, topics in application development, shells and scripting, debugging and hardening, and introductory topics, including the fundamentals of virtualization. See why thousands of programmers have chosen GNU/Linux Application Programming to teach them how to develop applications on the GNU/Linux operating system!","Computers / Programming / General","English","2017-02-18 10:38:12","0","0000-00-00","2017-02-18 10:38:12","9b52c839869d539a2f64cf2a37144918",
+"170","McDowell, Steven|Seyer, Martin D.","USB Explained","9780130811530","Prentice Hall","1998-10-04","0","1,","Default,","0","","384","","38,99","0","","","","Paperback","0","","","The Universal Serial Bus (USB) is a low-to-high-speed technology that provides a shared-access, highly available, robust, self-configuring, extensible, and easy-to-use serial bus that is host-computer independent and consistent across computer architectures. The advent of multimedia and the proliferation of relatively inexpensive processing power has left the venerable RS-232 a relic of times past. The USB was invented and standardized by a group of computer manufacturers and peripheral vendors in early 1995 under the auspices of an organization called the Universal Serial Bus Implementers Forum. It's goal was to define a high-speed serial bus technology to replace, or phase out, the existing RS-232 serial port technology. Today's serial bus technology must cover a full range of technology that can deliver everything from digital joysticks for high-precision game playing, to digital audio peripherals to high-resolution ""live"" video inupt and output devices to data networks and telephony equipment. The USB can do all of this at speeds faster than the RS-232 serial port was designed to handle. The biggest difference between a single-ended serial port (like RS-232) and a serial bus like the USB is that the traditional serial port is a point-to-point connection between a computer and a device, whereas on a ""serial bus"" many devices can communicate and share the connection to the computer. In the USB, up to 128 bus devices can simultaneously communicate with the host computer.","Computers / Systems Architecture / General","English","2017-02-18 10:38:22","0","0000-00-00","2017-02-18 10:38:22","0a34afb7baf789aab8b70218e6da9d8e",
+"171","Donahoo, Michael J.|Calvert, Kenneth L.","TCP/IP Sockets in C: Practical Guide for Programmers","9780123745408","Morgan Kaufmann Publishers","2009-03-01","0","1,","Default,","0","Morgan Kaufmann Practical Guides","196","","33,95","0","","","","Paperback","0","","","<i>TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition</i> is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.<br /><br />If you program using Java, be sure to check out this book's companion, <i>TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition</i>.<br /><br /><br /><br />Includes completely new and expanded sections that address the IPv6 network environment, defensive programming, and the select() system call, thereby allowing the reader to program in accordance with the most current standards for internetworking.<br />Streamlined and concise tutelage in conjunction with line-by-line code commentary allows readers to quickly program web-based applications without having to wade through unrelated and discursive networking tenets.","","English","2017-02-18 10:38:41","0","0000-00-00","2017-02-18 10:38:41","f942160a98295f71bccd632972da5487",
+"172","Fernando, Randima|Kilgard, Mark J.","CG Tutorial: The Definitive Guide to Programmable Real-Time Graphics, The","9780321194961","Addison-Wesley Professional","2003-03-08","0","1,","Default,","0","","336","","59,99","0","","","","Paperback","0","","","Cg is the key to unlocking the power of a generation of programmable graphics hardware. This book features an introduction to Cg. It is essential for anyone programming real-time graphics. It teaches you how to use Cg to create effects for real-time applications.","Computers / Digital Media / Video & Animation","English","2017-02-18 10:38:58","0","0000-00-00","2017-02-18 10:38:58","c1d5a310d2da733f678a4febd061d80f",
+"173","Hadnagy, Christopher|Wilson, Paul","Social Engineering: The Art of Human Hacking","9780470639535","Wiley Publishing","2010-12-21","0","1,","Default,","0","","382","","34,99","0","","","","Paperback","0","","","<b>The first book to reveal and dissect the technical aspect of many social engineering maneuvers</b> From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.<br /><br />Kevin Mitnick--one of the most famous social engineers in the world--popularized the term ""social engineering."" He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.<br /><br /><br />Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats <i>Social Engineering: The Art of Human Hacking</i> does its part to prepare you against nefarious hackers--now you can do your part by putting to good use the critical information within its pages.","Computers / Security / General","English","2017-02-18 10:39:17","0","0000-00-00","2017-02-18 10:39:17","36ed8ec1c28ceca93d6d77fac3211ce5",
+"174","Eilam, Eldad|Chikofsky, Elliot J.","Reversing: Secrets of Reverse Engineering","9780764574818","Wiley","2005-04-15","0","1,","Default,","0","","624","","40,00","0","","","","Paperback","0","","","Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various<br /> applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.<br /> * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products<br /> * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware<br /> * Offers a primer on advanced reverse-engineering, delving into ""disassembly""-code-level reverse engineering-and explaining how to decipher assembly language","Computers / Software Development & Engineering / General","English","2017-02-18 10:39:29","0","0000-00-00","2017-02-18 10:39:29","c55de2fc4415d86ca5ac8b16c908224c",
+"175","Burnham, Van|Baer, Ralph H.","Supercade: A Visual History Of The Videogame Age, 1971 1984","9780262024921","MIT Press (MA)","2001-09-01","0","1,","Default,","0","","448","","55,00","0","","","","Hardcover","0","","","Finalist in the category of Popular Culture in the Independent Publisher Book Awards 2002 (The Ippy Awards) presented by Independent Publisher Magazine.It was a time when technology was king, status was determined by your high score, and videogames were blitzing the world...From Pong to Pac-Man, Asteroids to Zaxxon--more than fifty million people around the world have come of age within the electronic flux of videogames, their subconscious forever etched with images projected from arcade and home videogame systems.From the first interactive blips of electronic light at Brookhaven National Labs and the creation of Spacewar! at the Massachusetts Institute of Technology; to the invention of the TV Game Project and the myriad systems of Magnavox, Atari, Coleco, and Mattel that followed; through the rise of the Golden Age of videogames and forward into the imagination of millions, Supercade is the first book to illustrate and document the history, legacy, and visual language of the videogame phenomenon.Exuberantly written and illustrated in full color, Supercade pays tribute to the technology, games, and visionaries of one of the most influential periods in the history of computer science--one that profoundly shaped the modern technological landscape and helped change the way people view entertainment.""Supercade"" includes contributions from such commentators and particpants as Ralph Baer, Julian Dibbell, Keith Feinstein, Joe Fielder, Lauren Fielder, Justin Hall, Leonard Herman, Steven Johnson, Steven Kent, Nick Montfort, Bob Parks, Carl Steadman, and Tom Vanderbilt.","Computers / Computer Literacy","English","2017-02-18 10:39:54","0","0000-00-00","2017-02-18 10:39:54","409ee8cb180137d7458f0185f1e0c368",
+"176","Torvalds, Linus","Just for fun","9789150100235","Alfabeta","2001-05-01","0","1,","Default,","0","","288","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:40:16","0","0000-00-00","2017-02-18 10:40:16","ee3fa92d3ba8c129ae93c419adc99f00",
+"177","Stroustrup, Bjarne","C++ Programming Language, The","9780321958327","Addison-Wesley Professional","2013-08-03","0","1,","Default,","0","4th Edition","1346","","84,99","0","","","","Hardcover","0","","","<P style=""MARGIN: 0px"">The new C++11 standard allows programmers to express ideas more clearly, simply, and directly, and to write faster, more efficient code. Bjarne Stroustrup, the designer and original implementer of C++, has reorganized, extended, and completely rewritten his definitive reference and tutorial for programmers who want to use C++ most effectively.</P> <P style=""MARGIN: 0px""> </P> <P style=""MARGIN: 0px""> <B> <I> <B>The C++ Programming Language, Fourth Edition,</B> </I> </B> delivers meticulous, richly explained, and integrated coverage of the entire language—its facilities, abstraction mechanisms, standard libraries, and key design techniques. Throughout, Stroustrup presents concise, “pure C++11” examples, which have been carefully crafted to clarify both usage and program design. To promote deeper understanding, the author provides extensive cross-references, both within the book and to the ISO standard.</P> <P style=""MARGIN: 0px""> </P> <P style=""MARGIN: 0px"">New C++11 coverage includes</P> <UL> <LI> <DIV style=""MARGIN: 0px"">Support for concurrency</DIV> <LI> <DIV style=""MARGIN: 0px"">Regular expressions, resource management pointers, random numbers, and improved containers</DIV> <LI> <DIV style=""MARGIN: 0px"">General and uniform initialization, simplified for-statements, move semantics, and Unicode support</DIV> <LI> <DIV style=""MARGIN: 0px"">Lambdas, general constant expressions, control over class defaults, variadic templates, template aliases, and user-defined literals</DIV> <LI> <DIV style=""MARGIN: 0px"">Compatibility issues </DIV> </LI> </UL> <P style=""MARGIN: 0px"">Topics addressed in this comprehensive book include</P> <UL> <LI> <DIV style=""MARGIN: 0px"">Basic facilities: type, object, scope, storage, computation fundamentals, and more</DIV> <LI> <DIV style=""MARGIN: 0px"">Modularity, as supported by namespaces, source files, and exception handling</DIV> <LI> <DIV style=""MARGIN: 0px"">C++ abstraction, including classes, class hierarchies, and templates in support of a synthesis of traditional programming, object-oriented programming, and generic programming</DIV> <LI> <DIV style=""MARGIN: 0px"">Standard Library: containers, algorithms, iterators, utilities, strings, stream I/O, locales, numerics, and more</DIV> <LI> <DIV style=""MARGIN: 0px"">The C++ basic memory model, in depth </DIV> </LI> </UL> <P style=""MARGIN: 0px"">This fourth edition makes C++11 thoroughly accessible to programmers moving from C++98 or other languages, while introducing insights and techniques that even cutting-edge C++11 programmers will find indispensable.</P> <P style=""MARGIN: 0px""> </P> <I> <P style=""MARGIN: 0px"">This is a hardcover version of the Fourth Edition. Content in this hardcover and the paperback version is identical.</P> <P style=""MARGIN: 0px""> </I> </P> <I> <B> <P style=""MARGIN: 0px"">This book features an enhanced, layflat binding, which allows the book to stay open more easily when placed on a flat surface. This special binding method—noticeable by a small space inside the spine—also increases durability.</P> </B> </I>","","English","2017-02-18 10:40:37","0","0000-00-00","2017-02-18 10:40:37","5fcf3cdfceec348fdbd9e262839502e0",
+"178","Frisch, Æleen|Frisch, AEleen","Essential System Administration: Tools and Techniques for Linux and Unix Administration","9780596003432","O'Reilly Media","2002-08-30","0","1,","Default,","0","","1178","","59,99","0","","","","Paperback","0","","","<i>Essential System Administration</i>,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. <i>Essential System Administration </i>provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.<br /><br />The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. <i>Essential System Administration</i>,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.<br /><br /><i>Essential System Administration</i> is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.<br /><br />Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, <i>Essential System Administration</i> is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.","Computers / General","English","2017-02-18 10:40:54","0","0000-00-00","2017-02-18 10:40:54","14261622a39c2fbc5d00abea7d69ac33",
+"179","Engineers, Solaris System","Solaris 10 System Administration Essentials","9780137000098","Prentice Hall PTR","2009-11-01","0","1,","Default,","0","","418","","44,99","0","","","","Paperback","0","","","<b> <i>Solaris 10 System Administration Essentials </i> </b>is the first book to concisely yet comprehensively cover all of the breakthrough features of the Solaris 10 operating system. The Solaris OS has a long history of innovation, and the Solaris 10 OS is a watershed release that includes features such as<br /><b>Zones, </b> which provide application isolation and facilitate server consolidation <b>ZFS, </b> the file system that provides a new approach to managing your data with an easy administration interface The <b>Fault Management Architecture, </b> which automates fault detection and resolution The <b>Service Management Facility, </b> a unified model for services and service management on every Solaris system <b>Dynamic Tracing (DTrace), </b> for troubleshooting OS and application problems on production systems in real time In addition, the Solaris 10 OS fully supports 32-bit and 64-bit x86 platforms, as well as the SPARC(r)architecture. The book s key topics include<br />Installing, booting, and shutting down a system Managing packages and patches (software updates) Controlling system processes Managing disks and devices Managing users Configuring networks Using printing services <b> <i>Solaris 10 System Administration Essentials</i> </b> is part of a new series on Solaris system administration. It is a practical guide to deploying and managing the Solaris 10 operating system in a business or academic environment. The book is easy to read and rich with examples a perfect companion for system administrators who are deploying the Solaris OS for the first time.""","","English","2017-02-18 10:41:04","0","0000-00-00","2017-02-18 10:41:04","f871e2b98651d58ec18da7fc3f9b3de4",
+"180","Ferguson, Niels|Schneier, Bruce","Practical Cryptography","9780471223573","Wiley","2003-04-17","0","1,","Default,","0","","385","","50,00","0","","","","Paperback","0","","","Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.<br /> Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.<br /> Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).","Language Arts & Disciplines / Communication","English","2017-02-18 10:41:20","0","0000-00-00","2017-02-18 10:41:20","3639f5337513b78decd6857e1e6a020e",
+"181","Bovet, Daniel P.|Cesati, Marco","Understanding the Linux Kernel","9780596005658","O'Reilly Media","2005-11-24","0","1,","Default,","0","","923","","59,99","0","","","","Paperback","0","","","In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.<br /><br />The third edition of <i>Understanding the Linux Kernel</i> takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.<br /><br />This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:<br /><br /><br />Memory management, including file buffering, process swapping, and Direct memory Access (DMA)<br />The Virtual Filesystem layer and the Second and Third Extended Filesystems<br />Process creation and scheduling<br />Signals, interrupts, and the essential interfaces to device drivers<br />Timing<br />Synchronization within the kernel<br />Interprocess Communication (IPC)<br />Program execution<br /><i>Understanding the Linux Kernel</i> will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.","","English","2017-02-18 10:41:44","0","0000-00-00","2017-02-18 10:41:44","e4652c719c142791a757b28d6d61bf26",
+"182","Kong, Joseph","FreeBSD Device Drivers: A Guide for the Intrepid","9781593272043","No Starch Press","2012-05-07","0","1,","Default,","0","","352","","49,95","0","","","","Paperback","0","","","Device drivers make it possible for your software to communicate with your hardware, and because every operating system has specific requirements, driver writing is nontrivial. When developing for FreeBSD, you've probably had to scour the Internet and dig through the kernel sources to figure out how to write the drivers you need. Thankfully, that stops now. In <i>FreeBSD Device Drivers</i>, Joseph Kong will teach you how to master everything from the basics of building and running loadable kernel modules to more complicated topics like thread synchronization. After a crash course in the different FreeBSD driver frameworks, extensive tutorial sections dissect real-world drivers like the parallel port printer driver.<br /><br />You'll learn:<br /><br /><br />All about Newbus, the infrastructure used by FreeBSD to manage the hardware devices on your system How to work with ISA, PCI, USB, and other buses The best ways to control and communicate with the hardware devices from user space How to use Direct Memory Access (DMA) for maximum system performance The inner workings of the virtual null modem terminal driver, the USB printer driver, the Intel PCI Gigabit Ethernet adapter driver, and other important drivers How to use Common Access Method (CAM) to manage host bus adapters (HBAs) Concise descriptions and extensive annotations walk you through the many code examples. Don't waste time searching man pages or digging through the kernel sources to figure out how to make that arcane bit of hardware work with your system. <i>FreeBSD Device Drivers</i> gives you the framework that you need to write any driver you want, now.","Computers / Operating Systems / UNIX","English","2017-02-18 10:42:02","0","0000-00-00","2017-02-18 10:42:02","700aa250f9287254804d2aac85090bc2",
+"183","Welsh, Matt|Kaufman, Lar","Running Linux","9781565921511","O'Reilly Media","1996-08-08","0","1,","Default,","0","","650","","29,95","0","","","","Paperback","0","","","Linux is the most exciting development today in the UNIX world -- and some would say in the world of the PC-compatible. A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and for low cost from many vendors. Its software packages include the X Window System (X11R6); TCP/IP networking (including SLIP, PPP, and NFS support); popular software tools such as Emacs and TeX; a complete software development environment including C, C++, Perl, Tcl/Tk, and more; libraries, debuggers, multimedia support, scientific and database applications, and much more. Developed first on the PC, it has been ported to many other architectures, and a POSIX-compliant version has even been developed.<br /><br /><i>Running Linux</i> explains everything you need to understand, install, and start using the Linux operating system. This includes a comprehensive installation tutorial, complete information on system maintenance, tools for document development and programming, and guidelines for network and Web site administration.<br /><br />New topics in the second edition include:<br /><br /><br />Printer configuration, management, and use Configuration of network clients for NFS and NIS Expanded information on configuring a wide range of hardware devices Updated configuration information for the kernel and XFree86","Computers / Operating Systems / UNIX","","2017-02-18 10:42:21","0","0000-00-00","2017-02-18 10:42:21","63a08dbabead82195b822f1862658402",
+"184","Furber, Steve|Furber, Stephen Bo","ARM System-on-Chip Architecture","9780201675191","Addison-Wesley Professional","2000-08-14","0","1,","Default,","0","2nd Edition","432","","73,99","0","","","","Paperback","0","","","<P>The future of the computer and communications industries is converging on mobile information appliances - phones, PDAs, laptops and other devices. The ARM is at the heart of this trend, leading the way in system-on-chip (SoC) development and becoming the processor core of choice for many embedded applications. <BR>System-on-chip technology is changing the way we use computers, but it also sets designers the very challenging problem of getting a complex SoC design right first time. ARM System-on-Chip Architecture introduces the concepts and methodologies employed in designing a system-on-chip based around a microprocessor core, and in designing the core itself. Extensive illustrations, based on the ARM, give practical substance to the design principles set out in the book, reinforcing the reader's understanding of how and why SoCs and microprocessors are designed as they are. <BR>ARM System-on-Chip Architecture:<BR>- presents and discusses the major issues of system-on-chip design, including memory hierarchy, caches, memory management, on-chip buses, on-chip debug and production test <BR>- provides an overview of the ARM processor family, enabling the reader to decide which ARM is best for the job in hand <BR>- describes the ARM and Thumb programming models, enabling the designer to begin to develop applications <BR>- covers all the latest ARM products and developments, including StrongARM, the ARM9 and ARM10 series of cores, and the ARM-based SoC components at the heart of Ericsson's Bluetooth technology, the Psion Series 5 PDA and Samsung's SGH2400 GSM handset <BR>- includes details on the AMULET asynchronous ARM cores and the AMULET3H asynchronous SoC subsystem <BR>ARM System-on-Chip Architecture is an essential handbook for system-on-chip designers using ARM processor cores and engineers working with the ARM. It can also be used as a course text for undergraduate and masters students of computer science, computer engineering and electrical engineering.  <BR> </P>","Computers / Software Development & Engineering / Systems Analysis & Design","English","2017-02-18 10:42:33","0","0000-00-00","2017-02-18 10:42:33","faa9260495d15d189322fa7673f5b84f",
+"185","Hohl, William","ARM Assembly Language: Fundamentals and Techniques","9781439806104","CRC Press","2009-03-13","0","1,","Default,","0","","349","","99,95","0","","","","Hardcover","0","","","Written by the director of ARM s worldwide academic program, this volume gives computer science professionals and students an edge, regardless of their preferred coding language. For those with some basic background in digital logic and high-level programming, the book examines code relevant to hardware and peripherals found on today's microcontrollers and looks at situations all programmers will eventually encounter.<br /><br />The book s carefully chosen examples teach easily transferrable skills that will help readers optimize routines and significantly streamline coding, especially in the embedded space.<br /><br />This book is easily adaptable for classroom use. Instructors can access features that include a solutions manual, assembly language basics, problems, and actual code. The book also provides access to a fully functional evaluation version of the <em>RealView Microcontroller Development Kit</em> from Keil.<br /><br />While it is still an important skill, getting good instruction in assembly language is not easy. The availability of languages such as C and Java foster the belief that engineers and programmers need only address problems at the highest levels of a program's operation. Yet, even modern coding methods, when done well, require an understanding of basic assembly methods such as those gained by learning ARM. Certain features that are the product of today s hardware, such as coprocessors or saturated math operations, can be accessed only through the hardware s native instructions. For that matter, any programmer wishing to achieve results as exact as his or her intentions needs to possess a mastery of machine code basics as taught in the pages of this book.<br /><br />Of the 13 billion microprocessor-based chips shipped in the last year, nearly 3 billion were ARM-based, making operational knowledge of ARM an essential component of any programmer s tool kit. That it can be applied with most any language makes it invaluable.<br /><br />""","Computers / General","English","2017-02-18 10:42:44","0","0000-00-00","2017-02-18 10:42:44","65b7175cb1b149433fc4dc22787b5c13",
+"186","Hallinan, Christopher","Embedded Linux Primer: A Practical, Real-World Approach","9780137017836","Prentice Hall","2010-11-03","0","1,","Default,","0","2nd Edition","616","","54,99","0","","","","Hardcover","0","","","<b>Up-to-the-Minute, Complete Guidance for Developing Embedded Solutions with Linux</b> Linux has emerged as today s #1 operating system for embedded products. Christopher Hallinan s Embedded Linux Primer has proven itself as the definitive real-world guide to building efficient, high-value, embedded systems with Linux. Now, Hallinan has thoroughly updated this highly praised book for the newest Linux kernels, capabilities, tools, and hardware support, including advanced multicore processors. Drawing on more than a decade of embedded Linux experience, Hallinan helps you rapidly climb the learning curve, whether you re moving from legacy environments or you re new to embedded programming. Hallinan addresses today s most important development challenges and demonstrates how to solve the problems you re most likely to encounter. You ll learn how to build a modern, efficient embedded Linux development environment, and then utilize it as productively as possible. Hallinan offers up-to-date guidance on everything from kernel configuration and initialization to bootloaders, device drivers to file systems, and BusyBox utilities to real-time configuration and system analysis. This edition adds entirely new chapters on UDEV, USB, and open source build systems.<br />Tour the typical embedded system and development environment and understand its concepts and components. Understand the Linux kernel and userspace initialization processes. Preview bootloaders, with specific emphasis on U-Boot. Configure the Memory Technology Devices (MTD) subsystem to interface with flash (and other) memory devices. Make the most of BusyBox and latest open source development tools. Learn from expanded and updated coverage of kernel debugging. Build and analyze real-time systems with Linux. Learn to configure device files and driver loading with UDEV. Walk through detailed coverage of the USB subsystem. Introduces the latest open source embedded Linux build systems. Reference appendices include U-Boot and BusyBox commands. ""","","English","2017-02-18 10:42:53","0","0000-00-00","2017-02-18 10:42:53","38197f5249b6328696f7107e3dd6918f",
+"187","Catsoulis, John","Designing Embedded Hardware","9780596003623","O'Reilly Media","2002-11-27","0","1,","Default,","0","","320","","39,95","0","","","","Paperback","0","","","Intelligent readers who want to build their own embedded computer systems-- installed in everything from cell phones to cars to handheld organizers to refrigerators-- will find this book to be the most in-depth, practical, and up-to-date guide on the market. <i>Designing Embedded Hardware</i> carefully steers between the practical and philosophical aspects, so developers can both create their own devices and gadgets and customize and extend off-the-shelf systems.<br /><br />There are hundreds of books to choose from if you need to learn programming, but only a few are available if you want to learn to create hardware. <i>Designing Embedded Hardware</i> provides software and hardware engineers with no prior experience in embedded systems with the necessary conceptual and design building blocks to understand the architectures of embedded systems.<br /><br />Written to provide the depth of coverage and real-world examples developers need, <i>Designing Embedded Hardware</i> also provides a road-map to the pitfalls and traps to avoid in designing embedded systems.<br /><br /><i>Designing Embedded Hardware</i> covers such essential topics as:<br /><br /><br />The principles of developing computer hardware Core hardware designs Assembly language concepts Parallel I/O Analog-digital conversion Timers (internal and external) UART Serial Peripheral Interface Inter-Integrated Circuit Bus Controller Area Network (CAN) Data Converter Interface (DCI) Low-power operation This invaluable and eminently useful book gives you the practical tools and skills to develop, build, and program your own application-specific computers.","Computers / Programming Languages / General","English","2017-02-18 10:43:09","0","0000-00-00","2017-02-18 10:43:09","a18e9568cf627c24d43f3f3be796ab12",
+"188","Fu, King-Sun|Fu, K. S.|Fu, King Sun","Syntactic Methods in Pattern Recognition","0122695607","Academic Press","1974-06-11","0","1,","Default,","0","Mathematics in Science & Engineering|Mathematics in Science and Engineering (112)","295","","175,00","0","","","","Hardcover","0","","","In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems. A number of computing techniques are considered, such as methods of operator approximation with any given accuracy; operator interpolation techniques including a non-Lagrange interpolation; methods of system representation subject to constraints associated with concepts of causality, memory and stationarity; methods of system representation with an accuracy that is the best within a given class of models; methods of covariance matrix estimation;<br>methods for low-rank matrix approximations; hybrid methods based on a combination of iterative procedures and best operator approximation; and<br>methods for information compression and filtering under condition that a filter model should satisfy restrictions associated with causality and different types of memory.<br><br>As a result, the book represents a blend of new methods in general computational analysis,<br>and specific, but also generic, techniques for study of systems theory ant its particular<br>branches, such as optimal filtering and information compression. <br><br>- Best operator approximation,<br>- Non-Lagrange interpolation,<br>- Generic Karhunen-Loeve transform<br>- Generalised low-rank matrix approximation<br>- Optimal data compression<br>- Optimal nonlinear filtering","Mathematics / Mathematical Analysis","English","2017-02-18 10:43:59","0","0000-00-00","2017-02-18 10:43:59","31ded92cb99202714e663bba0abe1a85",
+"189","Ward, Brice","Computer Technicians Handbook","0830615547","Mcgraw-hill Inc","1971-01-01","0","1,","Default,","0","","475","","","0","","","","Hardcover","0","","","","","English","2017-02-18 10:45:05","0","0000-00-00","2017-02-18 10:45:05","afd861c8b95cfbdec4b05ac996663b50",
+"190","Adams, Douglas","Ultimate Hitchhiker's Guide to the Galaxy, The","9780345453747","Del Rey Books","1996-01-17","0","1,","Default,","0","Hitchhiker's Guide to the Galaxy (1-5)","815","","20,00","0","","","","Paperback","0","","","At last in paperback in one complete volume, here are the five novels from Douglas Adams's Hitchhiker series. <br /><br />""The Hitchhiker's Guide to the Galaxy""<br /><br />Seconds before the Earth is demolished for a galactic freeway, Arthur Dent is saved by Ford Prefect, a researcher for the revised Guide. Together they stick out their thumbs to the stars and begin a wild journey through time and space.<br /><br />""The Restaurant at the End of the Universe""<br /><br />Facing annihilation at the hands of warmongers is a curious time to crave tea. It could only happen to the cosmically displaced Arthur Dent and his comrades as they hurtle across the galaxy in a desperate search for a place to eat.<br /><br />""Life, the Universe and Everything""<br /><br />The unhappy inhabitants of planet Krikkit are sick of looking at the night sky- so they plan to destroy it. The universe, that is. Now only five individuals can avert Armageddon: mild-mannered Arthur Dent and his stalwart crew.<br /><br />""So Long, and Thanks for All the Fish""<br /><br />Back on Earth, Arthur Dent is ready to believe that the past eight years were all just a figment of his stressed-out imagination. But a gift-wrapped fishbowl with a cryptic inscription conspires to thrust him back to reality. So to speak.<br /><br />""Mostly Harmless""<br /><br />Just when Arthur Dent makes the terrible mistake of starting to enjoy life, all hell breaks loose. Can he save the Earth from total obliteration? Can he save the Guide from a hostile alien takeover? Can he save his daughter from herself?<br /><br />Also includes the short story ""Young Zaphod Plays It Safe"".","","English","2017-02-18 10:45:28","0","0000-00-00","2017-02-18 10:45:28","b4c0af5a2b6e12b52ceac8f8b0f95cea",
+"191","Barrat, James","Our Final Invention: Artificial Intelligence and the End of the Human Era","9780312622374","Thomas Dunne Books/St Martin's Press (NY)","2013-10-01","0","1,","Default,","0","","336","","26,99","0","","","","Hardcover","0","","","In as little as a decade, artificial intelligence could match, then surpass human intelligence. Corporations &amp; government agencies around the world are pouring billions into achieving AI’s Holy Grail—human-level intelligence. Once AI has attained it, scientists argue, it will have survival drives much like our own. We may be forced to compete with a rival more cunning, more powerful &amp; more alien than we can imagine. Thru profiles of tech visionaries, industry watchdogs &amp; groundbreaking AI systems, James Barrat's <i>Our Final Invention</i> explores the perils of the heedless pursuit of advanced AI. Until now, human intelligence has had no rival. Can we coexist with beings whose intelligence dwarfs our own? Will they allow us to?","Science / General","English","2017-02-18 10:45:38","0","0000-00-00","2017-02-18 10:45:38","ad7e541f2d79c69fc48e4c7030e0e775",
+"192","Ruby, Sam|Hansson, David Heinemeier|Thomas, Dave|Thomas, David","Agile Web Development with Rails 3.2","9781934356548","Pragmatic Bookshelf","2011-04-14","0","1,","Default,","0","Pragmatic Programmers","473","","43,95","0","","","","Paperback","0","","","<p>Ruby on Rails helps you produce high-quality, beautiful-looking web applications quickly. You concentrate on creating the application, and Rails takes care of the details.</p><p>Tens of thousands of developers have used this award-winning book to learn Rails. It's a broad, far-reaching tutorial and reference that's recommended by the Rails core team. If you're new to Rails, you'll get step-by-step guidance. If you're an experienced developer, this book will give you the comprehensive, insider information you need.</p><p>Rails has evolved over the years, and this book has evolved along with it. We still start with a step-by-step walkthrough of building a real application, and in-depth chapters look at the built-in Rails features. This edition now gives new Ruby and Rails users more information on the Ruby language and takes more time to explain key concepts throughout. Best practices on how to apply Rails continue to change, and this edition keeps up. Examples use cookie backed sessions, HTTP authentication, and Active Record-based forms, and the book focuses throughout on the right way to use Rails. Additionally, this edition now reflects Ruby 1.9, a new release of Ruby with substantial functional and performance improvements.</p><p></p><p>Sam Ruby is a prominent software developer who is a co-chair of the W3C HTML Working Group and has made significant contributions to many of the Apache Software Foundation's open source software projects. He is a Senior Technical Staff Member in the Emerging Technologies Group of IBM.</p><p>Dave Thomas, as one of the authors of the Agile Manifesto, understands agility. As the author of ""Programming Ruby,"" he understands Ruby. And, as an active Rails developer, he knows Rails.</p><p>David Heinemeier Hansson is the creator of the Rails framework.</p>","Computers / Web / General","English","2017-02-18 10:46:06","0","0000-00-00","2017-02-18 10:46:06","b1e21be33ef0026796019f96a98c41f7",
+"193","Miles, Russ|Hamilton, Kim","Learning UML 2.0","9780596009823","O'Reilly Media","2006-06-01","0","1,","Default,","0","","269","","44,99","0","","","","Paperback","0","","","""Since its original introduction in 1997, the Unified Modeling Language has revolutionized software development. Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes learning the newest UML standard, UML 2.0, critical for all software developers--and there isn't a better choice than this clear, step-by-step guide to learning the language.""<br /><i>--Richard Mark Soley, Chairman and CEO, OMG</i><br /><br />If you're like most software developers, you're building systems that are increasingly complex. Whether you're creating a desktop application or an enterprise system, complexity is the big hairy monster you must manage.<br /><br /><br /><br />The Unified Modeling Language (UML) helps you manage this complexity. Whether you're looking to use UML as a blueprint language, a sketch tool, or as a programming language, this book will give you the need-to-know information on how to apply UML to your project. While there are plenty of books available that describe UML, <i>Learning UML 2.0</i> will show you how to use it. Topics covered include:<br /><br /><br /><br /><br />Capturing your system's requirements in your model to help you ensure that your designs meet your users' needs<br /><br /><br />Modeling the parts of your system and their relationships<br /><br /><br />Modeling how the parts of your system work together to meet your system's requirements<br /><br /><br />Modeling how your system moves into the real world, capturing how your system will be deployed<br /><br /><br />Engaging and accessible, this book shows you how to use UML to craft and communicate your project's design. Russ Miles and Kim Hamilton have written a pragmatic introduction to UML based on hard-earned practice, not theory. Regardless of the software process or methodology you use, this book is the one source you need to get up and running with UML 2.0.<br /><br /><br /><br />Russ Miles is a software engineer for General Dynamics UK, where he works with Java and Distributed Systems, although his passion at the moment is Aspect Orientation and, in particular, AspectJ. Kim Hamilton is a senior software engineer at Northrop Grumman, where she's designed and implemented a variety of systems including web applications and distributed systems, with frequent detours into algorithms development.","","English","2017-02-18 10:46:22","0","0000-00-00","2017-02-18 10:46:22","0d744abba2a0bf549b500c2721e13c56",
+"194","Lucas, Michael W.","Absolute Freebsd: The Complete Guide to Freebsd","9781593271510","No Starch Press","2007-11-19","0","1,","Default,","0","","736","","59,95","0","","","","Paperback","0","","","FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.<br /><br /><br /><br /><i>Absolute FreeBSD, 2nd Edition</i> is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. <i>Absolute FreeBSD, 2nd Edition</i> covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:<br /><br /><br />Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for both servers and clients Monitor your system with performance-testing and troubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network management system. Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.","Computers / Client-Server Computing","English","2017-02-18 10:46:34","0","0000-00-00","2017-02-18 10:46:34","c66c556c1745bb41c3ae29819aba111f",
+"195","Lewine, Donald","Posix Programmers Guide","9780937175736","O'Reilly Media","1991-04-08","0","1,","Default,","0","","640","","39,95","0","","","","Paperback","0","","","This guide, intended as an explanation of the POSIX standard and as a reference for the POSIX.1 programming library, helps you write more portable programs. Most UNIX systems today are POSIX compliant because the federal government requires it for its purchases. Even OSF and UI agree on support for POSIX.<br /><br />Unfortunately, given the manufacturer's documentation, it can be difficult to distinguish system-specific features from those features defined by POSIX. The <i>POSIX Programmer's Guide</i> is especially helpful if you are writing programs that must run on multiple UNIX platforms. This guide also helps you convert existing UNIX programs for POSIX compliance.<br /><br />Contents include:<br /><br /><br />Introduction to POSIX.<br />Basics of writing a POSIX-compliant program.<br />Input/output facilities of the Standard C library.<br />The file system as defined by POSIX.<br />Operations of POSIX Input/Output system, pipes, and FIFOs.<br />Creating and terminating processes and signals.<br />Obtaining information about the environment.<br />Communication line settings and a <i>cu</i>-like utility.<br />POSIX and Standard C, including features and portability pitfalls.<br />Internationalization.<br />Complete list of library functions in alphabetic order.<br />Complete list of data structures and their members.<br />All error codes.<br />Standard headers and the information that they define.<br />Related publications.","Computers / Operating Systems / UNIX","English","2017-02-18 10:46:57","0","0000-00-00","2017-02-18 10:46:57","c1f97225c88d1e678f3329f8c807a058",
+"196","Gallmeister, Bill","Posix.4 Programmers Guide","9781565920743","O'Reilly Media","1995-01-08","0","1,","Default,","0","","570","","39,95","0","","","","Paperback","0","","","What's ""real-world programming""?<br /><br />Real-world programming (typically called real-time programming) is programming that interacts in some way with the ""real world"" of daily life. At one time, real-time systems were confined to very esoteric applications, like rocket guidance systems. Now, they play a role in almost every aspect of life: they control the brakes on your car, video games, automatic bank tellers -- and the disk drive in your computer. It won't be long before mundane devices like toasters and hair dryers have microprocessors built in, to say nothing of multimedia devices that haven't even been invented yet.<br /><br />Real-world applications are characterized by deadlines. If the brake processor in your car doesn't meet a deadline, your car doesn't stop; if your video game doesn't meet a deadline, the Klingons don't die when you shoot them; if your ATM doesn't meet a deadline, you may start looking for another bank. When you've just rear-ended another car, it's no consolation that a sudden flurry of input slowed down your brake processor, so it couldn't react quickly enough when you hit the pedal.<br /><br />This book covers the POSIX.4 standard for portable real-time programming. The POSIX.4 standard itself is a massive document that defines system interfaces for asynchronous I/O, scheduling, communications, and other facilities. However, this book does more than explain the standard. It provides a general introduction to real-time programming and real-time issues: the problems software faces when it needs to interact with the real world and how to solve them. And, unlike most books about standards, this one isn't just readable -- it's enjoyable! If you're at all interested in real-time applications -- which include just about everything from telemetry to transaction processing -- this book will be an essential reference.<br /><br />Chapters include:<br /><br /><br />The Basics of Real-Time: Multiple Tasks<br />Better Coordination: Messages, Shared Memory, and Synchronization<br />On Time: Scheduling, Time, and Memory Locking<br />I/O for the Real World<br />Includes programming exercises, solutions, and reference manual pages.","Computers / Operating Systems / Linux","English","2017-02-18 10:47:06","0","0000-00-00","2017-02-18 10:47:06","970e36e9b252e3795286839f980d8480",
+"197","Corbet, Jonathan|Kroah-Hartman, Greg|Rubini, Alessandro","Linux Device Drivers","9780596005900","O'Reilly Media","2005-02-17","0","1,","Default,","0","","615","","39,95","0","","","","Paperback","0","","","<p>Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic ""Linux Device Drivers"" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.<br /></p><p>Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of ""Linux Device Drivers"" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.</p><p>Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.</p><p>Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.<br /></p>","Computers / Programming / General","English","2017-02-18 10:47:16","0","0000-00-00","2017-02-18 10:47:16","944a88a75957376aa79f9db2ff8be430",
+"198","Matthew, Neil|Stones, Richard","Beginning Linux Programming","9780764544972","Wiley Publishing","2004-01-02","0","1,","Default,","0","Programmer to Programmer","848","","39,99","0","","","","Paperback","0","","","<b>What is this book about?</b> If you have some programming experience and are ready to venture into Linux programming, this updated edition of the bestselling entry-level book takes you there. The authors guide you step by step, using construction of a CD database application to give you hands-on experience as you progress from the basic to the complex. You'll start with fundamental concepts like writing Unix programs in C. You'll learn basic system calls, file I/O, interprocess communication, and shell programming. You'll become skilled with the toolkits and libraries for working with user interfaces.<br /><br />The book starts from the basics, explaining how to compile and run your first program. New to this edition are chapters on MySQL(R) access and administration; programming GNOME and KDE; and Linux standards for portable applications. Coverage of kernel programming, device drivers, CVS, grep, and GUI development environments has expanded. This book gives you practical knowledge for real wor ld application.<br /><br /><b>What does this book cover?</b><br /><br />In this book, you will learn how to<br /><br /><br />Develop programs to access files and the Linux environment Use the GNU compiler, debugger and other development tools Program data storage aapplications for MySQL and DBM database systems Write programs that take advantage of signals, processes and threads Build graphical user interfaces using both the GTK (for GNOME) and Qt (for KDE) libraries Write device drivers that can be loaded into the Linux kernel Access the network using TCP/IP sockets Write scripts that use grep, regular expressions and other Linux facilities <b>Who is this book for?</b><br /><br />This book is for programmers with some C or C++ experience, who want to take advantage of the Linux development environment. You should have enough Linux familiarity to have installed and configured users on Linux.","Computers / Operating Systems / Linux","English","2017-02-18 10:47:33","0","0000-00-00","2017-02-18 10:47:33","092dbd838ff26ec3ad163102e080581e",
+"199","Lavigne, |Lavigne, Dru","BSD Hacks","9780596006792","O'Reilly Media","2004-05-31","0","1,","Default,","0","","450","","29,99","0","","","","Paperback","0","","","In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun.<br /><br />""Fun?"" you ask. Perhaps ""fun"" wasn't covered in the manual that taught you to install BSD and administer it effectively. But <i>BSD Hacks</i>, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems.<br /><br /><i>BSD Hacks</i> takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.<br />The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:<br /><br /><br />Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD<br />If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own--<i>BSD Hacks</i> is a must-have. This book will turn regular users into power users and system administrators into super system administrators.","Computers / Programming Languages / General","English","2017-02-18 10:47:42","0","0000-00-00","2017-02-18 10:47:42","e337c4b6dc90439e427aa8ecafdcf7fb",
+"200","Råde, Lennart|Westergren, Bertil|Rade, Lennart","Mathematics Handbook for Science and Engineering","9783540211419","Springer","2004-03-16","0","1,","Default,","0","","562","","89,99","0","","","","Hardcover","0","","","Fourth edition sold over 1400 copies in North America.<br /><br />For the fifth edition the chapter on Optimization has been enlarged and the chapters on Probability Theory and Statistics have been carefully revised.<br /><br />Includes over 450 graphs, figures and illustrations. There is an extensive, thoroughly cross-referenced index which lists over 1,400 terms.","Mathematics / Applied","English","2017-02-18 10:48:03","0","0000-00-00","2017-02-18 10:48:03","ede399f453189b8a95515d98348f9c43",
+"201","Stallman, Richard M.|Lessig, Lawrence|Gay, Joshua|Stallman, Richard","Free Software, Free Society: Selected Essays","9781882114986","Free Software Foundation","2002","0","1,","Default,","0","","224","","24,95","0","","","","Hardcover","0","","","<p>This collection includes historical writings such as The GNU Manifesto, which defined and launched the activist Free Software Movement, along with new writings on hot topics in copyright, patent law, and the controversial issue of ""trusted computing.""<br />Stallman takes a critical look at common abuses of copyright law and<br />patents when applied to computer software programs, and how these<br />abuses damage our entire society and remove our existing freedoms. He<br />also discusses the social aspects of software and how free software<br />can create community and social justice.</p><br /><br /><br /><p>Given the current turmoil in copyright and patent laws, including<br />the DMCA and proposed CBDTPA, these essays are more relevant than<br />ever. Stallman tackles head-on the essential issues driving the<br />current changes in copyright law. He argues that for creativity to<br />flourish, software must be free of inappropriate and overly-broad<br />legal constraints. Over the past twenty years his arguments and<br />actions have changed the course of software history; this new book is<br />sure to impact the future of software and legal policies in the years<br />to come.</p><br /><br /><br /><p>Lawrence Lessig, the author of two well-known books on similar topics,<br />writes the introduction. He is a noted legal expert on copyright law<br />and a Stanford Law School professor. </p>","Philosophy / Ethics & Moral Philosophy","English","2017-02-18 10:48:14","0","0000-00-00","2017-02-18 10:48:14","8cbcedb735084068d8ae34751110f2fe",
+"202","Brodie, Leo","Thinking Forth","9780976458708","Punchy Publishing","2004-12-27","0","1,","Default,","0","","316","","30,00","0","","","","Paperback","0","","","Thinking Forth applies a philosophy of problem solving and programming style to the unique programming language Forth. Published first in 1984, it could be among the timeless classics of computer books, such as Fred Brooks' The Mythical Man-Month and Donald Knuth's The Art of Computer Programming. Many software engineering principles discussed here have been rediscovered in eXtreme Programming, including (re)factoring, modularity, bottom-up and incremental design. Here you'll find all of those and more, such as the value of analysis and design, described in Leo Brodie's down-to-earth, humorous style, with illustrations, code examples, practical real life applications, illustrative cartoons, and interviews with Forth's inventor, Charles H. Moore as well as other Forth thinkers.","Computers / General","English","2017-02-18 10:49:01","0","0000-00-00","2017-02-18 10:49:01","41cb029c76b3c406c924a29343b58f2a",
+"203","Gabbay, Dov M.|Gabbay, D. M.|Schmidt, R.|Szalas, A.|Schmidt, Renate A.|Szałas, Andrzej","Second Order Quantifier Elimination: Foundations, Computational Aspects and Applications","9781904987567","College Publications","2008-04-17","0","1,","Default,","0","Studies in Logic","320","","30,50","0","","","","Paperback","0","","","In recent years there has been an increasing use of logical methods and significant new developments have been spawned in several areas of computer science, ranging from artificial intelligence and software engineering to agent-based systems and the semantic web. In the investigation and application of logical methods there is a tension between: * the need for a representational language strong enough to express domain knowledge of a particular application, and the need for a logical formalism general enough to unify several reasoning facilities relevant to the application, on the one hand, and * the need to enable computationally feasible reasoning facilities, on the other hand. Second-order logics are very expressive and allow us to represent domain knowledge with ease, but there is a high price to pay for the expressiveness. Most second-order logics are incomplete and highly undecidable. It is the quantifiers which bind relation symbols that make second-order logics computationally unfriendly. It is therefore desirable to eliminate these second-order quantifiers, when this is mathematically possible; and often it is. If second-order quantifiers are eliminable we want to know under which conditions, we want to understand the principles and we want to develop methods for second-order quantifier elimination. This book provides the first comprehensive, systematic and uniform account of the state-of-the-art of second-order quantifier elimination in classical and non-classical logics. It covers the foundations, it discusses in detail existing second-order quantifier elimination methods, and it presents numerous examples of applications and non-standard uses in different areas. These include: * classical and non-classical logics, * correspondence and duality theory, * knowledge representation and description logics, * commonsense reasoning and approximate reasoning, * relational and deductive databases, and * complexity theory. The book is intended for anyone interested in the theory and application of logics in computer science and artificial intelligence.","Computers / Computer Science","English","2017-02-18 10:49:16","0","0000-00-00","2017-02-18 10:49:16","5ca4ffcc19ca3cb836c705dd9abdb9c4",
+"204","Raymond, Eric S.","New Hacker's Dictionary, The","9780262680929","Mit Press","1996-10-11","0","1,","Default,","0","","568","","45,00","0","","","","Paperback","0","","","This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on","Computers / Reference","English","2017-02-18 10:49:42","0","0000-00-00","2017-02-18 10:49:42","67fb3e1feb857d109a0eee740ffdeb21",
+"205","Hallberg, Tord Jöran","IT-gryning : svensk datahistoria från 1840- till 1960-talet","9789144035017","Studentlitteratur AB","2007-02-21","0","1,","Default,","0","","395","","","0","","","","Hardcover","0","","","","","Swedish","2017-02-18 10:49:59","0","0000-00-00","2017-02-18 10:49:59","faceeeadf1e206c70bf18a77eb596c8e",
+"206","Huitema, Christian","Ipv6: The New Internet Protocol","9780138505059","Prentice Hall PTR","1997-10-28","0","1,","Default,","0","2nd Edition","247","","39,99","0","","","","Paperback","0","","","For the Internet to continue its extraordinary growth, the IP protocol must evolve to support new addressing and routing techniques. After years of debate, the new IP protocol, IPv6, has been finalized - and the transition is underway. In this completely updated guide to IPv6, the former Chair of the Internet Architecture Board explains the new standard in detail. Discover how IPv6 delivers: * A new addressing architecture to support rapid Internet growth. * Support for multicasting and anycasting. * Support of real-time multimedia and other applications. * Enhanced security, including encryption and authentication. Learn how IPv6 differs from IPv4 - and how to prepare your networks, equipment, and software. Walk through transition options, including a dual-stack strategy and tunneling. See how to plug-and-play the IPv6 protocol, minimizing the impact on other network software and hardware. Understand how IPv6 can be carried over ATM networks. IPv6 is coming - and as an Internet professional, you need to understand it. This book delivers the critical, timely information you need for planning and deployment.","Computers / Networking / General","English","2017-02-18 10:50:11","0","0000-00-00","2017-02-18 10:50:11","5531814706d905f3d1606512cfd9295f",
+"207","Miller, Mark A.","Implementing Ipv6: Supporting the Next Generation Internet Protocols [With CDROM]","9780764545894","Wiley","2000-03-15","0","1,","Default,","0","M&t IP Library","432","","49,99","0","","","","Paperback","0","","","If you are a network manager transitioning from an older Internet Protocol to Internet Protocol version 6, you know that version 6 includes enhancements to maintain the network efficiency required by increasing traffic. ""Implementing IPv6,"" 2nd Edition is written to facilitate this transition by presenting the following: <br />Shortcomings of IPv4 and the resulting functions and specifications of IPv6 Architecture of IPv6<br />Enhancements to support systems required for IPv6<br />Intranetwork communication and issues surrounding support for local networks<br />Routing issues and enhancements to RIP, OSPF, and BGP<br />Operating system enhancements, application programming interfaces, and security<br />Network management and transition strategies<br />The enclosed CD-ROM includes the Request for Comments documents for IPv6 and the related protocols that define IPv6 standards.","","English","2017-02-18 10:50:22","0","0000-00-00","2017-02-18 10:50:22","cd01fec93cc548529517a8f16243decd",
+"208","Carter, Gerald","LDAP System Administration: Putting Directories to Work","9781565924918","O'Reilly Media","2003-03-20","0","1,","Default,","0","","312","","39,95","0","","","","Paperback","0","","","<div><p>Be more productive and make your life easier. That's what <i>LDAP System Administration</i> is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately ""see"" the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:</p><ul><li>Configuration and access control</li><li>Distributed directories; replication and referral</li><li>Using OpenLDAP to replace NIS</li><li>Using OpenLDAP to manage email configurations</li><li>Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius</li><li>Interoperating with different LDAP servers, including Active Directory</li><li>Programming using Net::LDAP</li></ul>If you want to be a master of your domain, <i>LDAP System Administration</i> will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.</div>","Computers / Networking / Intranets & Extranets","English","2017-02-18 10:50:34","0","0000-00-00","2017-02-18 10:50:34","4c6e98ce3399803b78137aa3c2602682",
+"209","Barrett, Daniel J.|Silverman, Richard|Byrnes, Robert G.|Silverman, Richard E.|Barrett, Daniel|Byrnes, Robert","SSH, The Secure Shell: The Definitive Guide","9780596008956","O'Reilly Media","2005-05-17","0","1,","Default,","0","","670","","44,99","0","","","","Paperback","0","","","Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.<br /><br />Everything you want to know about SSH is in our second edition of <i>SSH, The Secure Shell: The Definitive Guide</i>. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.<br /><br />How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is ""transparent"" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique ""tunneling"" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.<br /><br />Written for a wide, technical audience, <i>SSH, The Secure Shell: The Definitive Guide</i> covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.<br /><br />No matter where or how you're shipping information, <i>SSH, The Secure Shell: The Definitive Guide</i> will show you how to do it securely.","Computers / Networking / Intranets & Extranets","English","2017-02-18 10:50:44","0","0000-00-00","2017-02-18 10:50:44","48b1d9091c0694dd105c6a305509e39d",
+"210","Mittelbach, Frank|Goossens, Michel|Braams, Johannes|Carlisle, David|Rowley, Chris","Latex Companion, The","9780201362992","Addison-Wesley Professional","2004-05-02","0","1,","Default,","0","Tools and Techniques for Computer Typesetting","1120","","74,99","0","","","","Paperback","0","","","This is the digial version of the printed book (Copyright (c) 2004). <br /><i>The LaTeX Companion</i> has long been the essential resource for anyone using LaTeX to create high-quality printed documents. This completely updated edition brings you all the latest information about LaTeX and the vast range of add-on packages now available--over 200 are covered! Full of new tips and tricks for using LaTeX in both traditional and modern typesetting, this book will also show you how to customize layout features to your own needs--from phrases and paragraphs to headings, lists, and pages. <i>Inside, you will find: </i><br />Expert advice on using LaTeX's basic formatting tools to create all types of publications--from memos to encyclopedias In-depth coverage of important extension packages for tabular and technical typesetting, floats and captions, multicolumn layouts--including reference guides and discussions of the underlying typographic and TeXnical concepts Detailed techniques for generating and typesetting contents lists, bibliographies, indexes, etc. Tips and tricks for LaTeX programmers and systems support <i>New to this edition: </i><br />Nearly 1,000 fully tested examples that illustrate the text and solve typographical and technical problems--all ready to run! An additional chapter on citations and bibliographies Expanded material on the setup and use of fonts to access a huge collection of glyphs, and to typeset text from a wide range of languages and cultures Major new packages for graphics, ""verbatim"" listings, floats, and page layout Full coverage of the latest packages for all types ofdocuments--mathematical, multilingual, and many more Detailed help on all error messages, including those troublesome low-level TeX errors Like its predecessor, <i> <b>The LaTeX Companion, Second Edition, </b> </i> is an indispensable reference for anyone wishing to use LaTeX productively. The accompanying CD-ROM contains a complete plug-and-play LaTeX installation, including all the packages and examples featured in the book. <br />""","Computers / Electronic Publishing","English","2017-02-18 10:50:54","0","0000-00-00","2017-02-18 10:50:54","03f43da42398ebd3470442d8617d65b3",
+"211","Mitnick, Kevin D.|Simon, William L.|Wozniak, Steve","Art of Deception: Controlling the Human Element of Security, The","9780764542800","John Wiley & Sons","2003-10-17","0","1,","Default,","0","","352","","16,95","0","","","","Paperback","0","","","The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security<br /> Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, ""It takes a thief to catch a thief.""<br /> Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.","Computers / Security / General","English","2017-02-18 10:51:22","0","0000-00-00","2017-02-18 10:51:22","46f0f68b9eba3366fa6649d90e2e5b03",
+"212","Howes, Timothy A.|Smith, Mark C.|Good, Gordon S.|Howes, Tim|Good, Gordon|Smith, Mark","Understanding And Deploying Ldap Directory Services","9781578700707","MacMillan Technical Publishing","1999-01-01","0","1,","Default,","0","MacMillan Network Architecture & Development","880","","50,00","0","","","","Unknown Binding","0","","","This comprehensive tutorial provides the reader with a thorough treatment of LDAP directory services. Minimal knowledge of general networking and administration is assumed, making the material accessible to intermediate and advanced readers alike. De signed to meet multiple needs, the first part of the book presents a general overview of the subject matter, and the next three sections cover detailed instructions for design, deployment, and integration of directory services. The text is full of practical implementation advice and real-world deployment examples to help the reader choose the path that makes the most sense for the specific organization.","","English","2017-02-18 10:51:48","0","0000-00-00","2017-02-18 10:51:48","932ce8c12f0dbba05040d0c5157402bd",
+"213","Asimov, Isaac","Complete Robot, The","9780586057247","Voyager","1983-12-15","0","1,","Default,","0","Robot (0.3)|Robot Series","688","","","0","","","","Paperback","0","","","THE COMPLETE ROBOT is the definitive anthology of Asimov's stunning visions of a robotic future…<br /><br /> In these stories, Isaac Asimov creates the Three Laws of Robotics and ushers in the Robot Age: when Earth is ruled by master-machines and when robots are more human than mankind.<br /><br /> As well as TN-3 (Tony), AL-76 and other robots, the stories feature the staff of US Robots and Mechanical Men Inc., and in particular the chief robot-psychologist, the steely Dr Susan Calvin who is in many ways more robot-like than her subjects.<br /><br /> THE COMPLETE ROBOT is the ultimate collection of timeless, amazing and amusing robot stories from the greatest science fiction writer of all time, offering golden insights into robot thought processes. Asimov's Three Laws of Robotics were programmed into real computers thirty years ago at the Massachusetts Institute of Technology - with surprising results. Readers of today still have many surprises in store...","Fiction / Science Fiction / General","English","2017-02-18 10:52:02","0","0000-00-00","2017-02-18 10:52:02","bfab798863779841738b1a4d624c5b83",
+"214","Brooks, Max","Zombie Survival Guide: Complete Protection from the Living Dead, The","9780715633182","Gerald Duckworth & Co Ltd","2004-08-27","0","1,","Default,","0","","272","","","0","","","","Paperback","0","","","The Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to outfit your home for a long siege, and how to survive and adapt in any territory or terrain.<br /><br />Top 10 Lessons for Surviving a Zombie Attack<br /><br />1. Organize before they rise!<br />2. They feel no fear, why should you?<br />3. Use your head: cut off theirs.<br />4. Blades don’t need reloading.<br />5. Ideal protection = tight clothes, short hair.<br />6. Get up the staircase, then destroy it.<br />7. Get out of the car, get onto the bike.<br />8. Keep moving, keep low, keep quiet, keep alert!<br />9. No place is safe, only safer.<br />10. The zombie may be gone, but the threat lives on.<br /><br />Don’t be carefree and foolish with your most precious asset—life. This book is your key to survival against the hordes of undead who may be stalking you right now without your even knowing it. The Zombie Survival Guide offers complete protection through trusted, proven tips for safeguarding yourself and your loved ones against the living dead. It is a book that can save your life.","","English","2017-02-18 10:52:16","0","0000-00-00","2017-02-18 10:52:16","c77b0b8a99f19ba4507179c1ebe5a1fb",
+"215","Schneier, Bruce","Applied Cryptography: Protocols, Algorithms, and Source Code in C","9780471117094","John Wiley & Sons","1993-11-10","0","1,","Default,","0","Author","758","","","0","","","","Paperback","0","","","New copy. Fast shipping. Will be shipped from US.","","English","2017-02-18 10:52:38","0","0000-00-00","2017-02-18 10:52:38","521d02fc7882c51b1d8c786c8ef74384",
+"216","McGinnis, Evan|Perkins, David T.","Understanding SNMP Mibs","9780134377087","Prentice Hall","1996-12-13","0","1,","Default,","0","","528","","79,33","0","","","","Paperback","0","","","<b> </b>Shows network professionals how to design, define, write and update useful SNMP Management Information Bases (MIBs) that support standards-based network management.<b> </b>Introduces SNMP MIBs, documents that contain definitions of management information which allow systems to be remotely monitored, configured and controlled. Presents a model of an SNMP-based management network and defines the SNMP management framework. Walks through the construction of MIBs, including name space organization, MIB naming, maintenance, object semantics and object style, and othe topics. Presents advanced techniques, including tables within tables, multi-table relationships and linked lists. Shows how to analyze standard MIBs. Discusses front-end and back-end MIB compilers, including SMIC, NetView/6000 SunNet Manager and HP OpenView. Includes a guide to MIB developer's resources. <b> </b>Anyone involved in building systems that must be compliant with the Simple Network Management Protocol (SNMP), the leading international standard for network management.","Computers / Networking / General","English","2017-02-18 10:53:55","0","0000-00-00","2017-02-18 10:53:55","3165eb6d8f525893f5aa35aa280d3c0d",
+"217","Huang, Andrew","Hacking the Xbox: An Introduction to Reverse Engineering","9781593270292","No Starch Press","2003-05-27","0","1,","Default,","0","","288","","24,99","0","","","","Paperback","0","","","<div><p>This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. <i>Hacking the Xbox</i> includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.</p><p><i>Hacking the Xbox</i> also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.</p></div>","Games / Video & Electronic","English","2017-02-18 10:54:09","0","0000-00-00","2017-02-18 10:54:09","d31cb62a00b28818c5cd5128117fb73a",
+"218","Liu, Cricket|Albitz, Paul","DNS and BIND","9780596100575","O'Reilly Media","2006-06-02","0","1,","Default,","0","5th Edition","642","","49,99","0","","","","Paperback","0","","","DNS and BIND tells you everything you need to work with one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service.<br /><br />The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).<br /><br />Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.<br /><br />Topics include:<br /><br /><br />What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module","Computers / Networking / Intranets & Extranets","English","2017-02-18 10:54:19","0","0000-00-00","2017-02-18 10:54:19","a68934d28269c538e8609ce7fee7eaf1",
+"219","Lucas, Michael W.","Absolute OpenBSD: UNIX for the Practical Paranoid","9781593274764","No Starch Press","2013-04-30","0","1,","Default,","0","","536","","59,95","0","","","","Paperback","0","","","<b>The definitive guide to OpenBSD</b><br /><br /><i>Foreword by Henning Brauer, OpenBSD PF Developer</i><br /><br />OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of <i>Absolute OpenBSD</i> maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. You'll learn the intricacies of the platform, the technical details behind certain design decisions, and best practices, with bits of humor sprinkled throughout. This edition has been completely updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques.<br /><br />You'll learn how to:<br /><br /><br />Manage network traffic with VLANs, trunks, IPv6, and the PF packet filter Make software management quick and effective using the ports and packages system Give users only the access they need with groups, sudo, and chroots Configure OpenBSD's secure implementations of SNMP, DHCP, NTP, hardware sensors, and more Customize the installation and upgrade processes for your network and hardware, or build a custom OpenBSD release<br />Whether you're a new user looking for a complete introduction to OpenBSD or an experienced sysadmin looking for a refresher, <i>Absolute OpenBSD, 2nd Edition</i> will give you everything you need to master the intricacies of the world's most secure operating system.<br /><br /><i>""The definitive book on OpenBSD gets a long-overdue refresh.""</i><br /><br /> -<b>Theo de Raadt, OpenBSD Founder</b>","Computers / System Administration / Linux & UNIX Administration","English","2017-02-18 10:54:29","0","0000-00-00","2017-02-18 10:54:29","95ca79710e469d2d82015ea1d601ecb0",
+"220","Glassner, Andrew S.|Haines, Eric|Hanrahan, Pat|Cook, Robert L.|Arvo, James|Kirk, David|Heckbert, Paul S.","Introduction to Ray Tracing, An","9780122861604","Morgan Kaufmann Publishers","1989-02-11","0","1,","Default,","0","The Morgan Kaufmann Series in Computer Graphics","368","","72,95","0","","","","Hardcover","0","","","The creation of ever more realistic 3-D images is central to the development of computer graphics. The ray tracing technique has become one of the most popular and powerful means by which photo-realistic images can now be created. The simplicity, elegance and ease of implementation makes ray tracing an essential part of understanding and exploiting state-of-the-art computer graphics.<br /><b>An Introduction to Ray Tracing</b> develops from fundamental principles to advanced applications, providing ""how-to"" procedures as well as a detailed understanding of the scientific foundations of ray tracing. It is also richly illustrated with four-color and black-and-white plates. This is a book which will be welcomed by all concerned with modern computer graphics, image processing, and computer-aided design. <br />Key Features<br />* Provides practical ""how-to"" information<br />* Contains high quality color plates of images created using ray tracing techniques<br />* Progresses from a basic understanding to the advanced science and application of ray tracing","Computers / Computer Science","English","2017-02-18 10:54:39","0","0000-00-00","2017-02-18 10:54:39","1b2a6560c760657cb9ef51655a5fe81d",
+"221","Vladimirov, Andrew|Gavrilenko, Konstantin V.|Mikhailovsky, Andrei A.|Vladimirov, Andrew A.","Wi-Foo: The Secrets of Wireless Hacking","9780321202178","Addison-Wesley Professional","2004-07-08","0","1,","Default,","0","","592","","54,99","0","","","","Paperback","0","","","A guide to penetrating and defending wireless networks, and to hacking wireless networks. It helps you master the attacker's arsenal of hardware and software tools: knowledge for crackers and auditors. It also helps you learn systematic counter measures for building hardened wireless 'citadels' including cryptography-based techniques.","Computers / Security / General","English","2017-02-18 10:54:49","0","0000-00-00","2017-02-18 10:54:49","76a26e8afa311df767ae399d58eaa803",
+"222","Duntemann, Jeff","Jeff Duntemann's Drive-By Wi-Fi Guide","9781932111743","Paraglyph Press","2003-03-08","0","1,","Default,","0","","450","","29,99","0","","","","Paperback","0","","","Provides everything Wi-Fi users need to know to design, build, protect, and extend a Wi-Fi wireless network! In this book, legendary tech teacher, wireless expert, and best-selling author Jeff Duntemann explains how to make Wi-Fi really work. Easy and economical hands-on projects allow readers to boost power with a variety of common household items, which make this book a true standout.","Computers / Networking / Intranets & Extranets","English","2017-02-18 10:55:11","0","0000-00-00","2017-02-18 10:55:11","cd8db3c88d9363b7618d3cd82f8dc1a0",
+"223","Carrier, Brian","File System Forensic Analysis","9780321268174","Addison-Wesley Professional","2005-03-27","0","1,","Default,","0","","600","","84,99","0","","","","Paperback","0","","","<b>The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques</b> Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools including tools he personally developed. Coverage includes<br />Preserving the digital crime scene and duplicating hard disks for ""dead analysis"" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use. ""","","English","2017-02-18 10:55:29","0","0000-00-00","2017-02-18 10:55:29","7080a508667f4f7da8d396c79e1f3f73",
+"224","Knuth, Donald Ervin|Knuth, Donald E.","Art of Computer Programming, Volumes 1-3 Boxed Set, The","9780201485417","Addison-Wesley Professional","1998-10-15","0","1,","Default,","0","Art of Computer Programming","896","","199,99","0","","","","Boxed Set - Hardcover","0","","","Knuth's classic work has been widely acclaimed as one of the most influential works in the field of computer science. For the first time, these books are available as a boxed, three-volume set. The handsome slipcase makes this set an ideal gift for the recent computer science graduate or professional programmer. Offering a description of classical computer science, this multi-volume work is a useful resource in programming theory and practice for students, researchers, and practitioners alike. For programmers, it offers cookbook solutions to their day-to-day problems.","","English","2017-02-18 10:55:46","0","0000-00-00","2017-02-18 10:55:46","72cb29f762941d9872265856e5e06b8f",
+"225","Blinn, Bruce","Portable Shell Programming: An Extensive Collection of Bourne Shell Examples","9780134514949","Prentice Hall","1995-10-29","0","1,","Default,","0","","288","","56,60","0","","","","Paperback","0","","","<P> <B> </B> Traditionally, books on shell programming present the shell as the user interface to UNIX. This complete guide shows how to use the shell to develop shell scripts, using the shell more like a programming language than a command interpreter. <B> </B> Covers shell syntax, portability on different UNIX systems, using shell scripts to catch or ignore signals, executing commands using the remote shell command, and using the shell's redirection syntaxes. <B> </B> For software development engineers, system administrators, and QA test engineers who work with UNIX computer systems. </P>","","English","2017-02-18 10:56:01","0","0000-00-00","2017-02-18 10:56:01","ccf2e8c7e9401d1195fadf7805917841",
+"226","Bartlett, Jamie","Dark Net: Inside the Digital Underworld, The","9781612194899","Melville House","2015-05-22","0","1,","Default,","0","","320","","27,95","0","","","","Hardcover","0","","","<b>An <i>Independent</i> and <i>New Statesman</i> Book of the Year</b><br /><br />Beyond the familiar online world that most of us inhabit—a world of Google, Facebook, and Twitter—lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.<br /><br />In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the internet we don't know. Beginning with the rise of the internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes—and puts a human face on those who have many reasons to stay anonymous.<br /><br />Rich with historical research and revelatory reporting, <i>The Dark Net</i> is an unprecedented, eye-opening look at a world that doesn't want to be known.","Law / Computer & Internet","English","2017-02-18 10:56:12","0","0000-00-00","2017-02-18 10:56:12","b61efa6ad361886b8336274749cb2089",
+"227","Mitnick, Kevin D.|Simon, William L.","Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers, The","9780471782667","John Wiley & Sons","2006-01-01","0","1,","Default,","0","","270","","16,95","0","","","","Paperback","0","","","<b>Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling <i>The Art of Deception</i></b><br /> Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use ""social engineering"" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:<br />A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A ""Robin Hood"" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting ""you are there"" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.","","English","2017-02-18 10:56:34","0","0000-00-00","2017-02-18 10:56:34","e7867c9ea9743651b5b3c78844f1f8d9",
+"228","Halsall, F.|O'Reilly, J.|Dagless, E.L.|Co., Addison-Wesley Pub.|Halsall, Fred","Data Communications, Computer Networks and Open Systems","9780201422931","Addison Wesley Publishing Company","1995-09-20","0","1,","Default,","0","4th Edition","408","","107,00","0","","","","Hardcover","0","","","This work provides a comprehensive introduction to data communications and computer networks. It is revised and updated to keep abreast of rapid developments that have taken place in the area. It features: detailed coverage of the fundamentals of data communication, including essential theory associated with digital transmission, interface standards, data compression and error detection methods; a complete description of the protocols in both the TCP/IP and OSI suites; extensive use of diagrams throughout to clarify and explain the subjects discussed; and a detailed description of how protocols are formally specified, with a methodology for their implementation.","Computers / General","English","2017-02-18 10:56:48","0","0000-00-00","2017-02-18 10:56:48","01ff16dee3511733f2102f13ce35e85f",
+"229","Elmasri, Ramez|Navathe, Shamkant B.","Fundamentals of Database Systems","9780321204486","Addison Wesley","2003-08-21","0","1,","Default,","0","International Edition","1009","","","0","","","","Paperback","0","","","Responding to the requests of database professors nationwide,the leading textbook for the introductory database management course is being fully revised in time for the startof Fall 1999 classes. Fundamentals of Database Systems, Third Edition is updated to reflect the latest developments indatabase research and practice. It combines clear explanations of theory and real systems, broad coverage of modeling and design of databases, and excellent examples with up-to-date introductions to modern database technology.<br />Features of the Third Edition<br /><br />Presents clear and complete discussion of the relational approach including modeling, design, and query languages<br /><br />Reorganized material on data modeling to clearly separate entity relationship modeling, extended entity relationship modeling, and object-oriented modeling<br /><br />NEW! Gives examples of real database systems - Oracle and Microsoft Access - in Ch. 10<br /><br />NEW and EXPANDED! Provides coverage of the object-oriented and object relational approach to data management including ODMG and SQL3<br /><br />NEW! Includes discussion of decision support applications of data warehousing and data mining, as well as emerging technologies of web databases, multimedia, and mobile databases<br /><br />NEW! Covers advanced modeling in the areas of active, temporal, and spatial databases<br /><br />NEW! Discusses current database application areas of GIS, genome, and digital libraries","","English","2017-02-18 10:57:02","0","0000-00-00","2017-02-18 10:57:02","72b71ee8e9eebec54d20f1e7e3b30971",
+"230","Russell, Stuart|Norvig, Peter","Artificial Intelligence: A Modern Approach","9780132071482","Pearson","2010-05-27","0","1,","Default,","0","","1132","","","0","","","","Paperback","0","","","For one or two-semester, undergraduate or graduate-level courses in Artificial Intelligence. The long-anticipated revision of this best-selling text offers the most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence. View chapters 3 and 4 from the Third Edition.","","English","2017-02-18 10:57:17","0","0000-00-00","2017-02-18 10:57:17","98d6fa6c92fc0a7a5465a9c972289b7a",
+"231","Cormen, Thomas H.|Leiserson, Charles E.|Rivest, Ronald L.|Stein, Clifford","Introduction to Algorithms","9780262033848","MIT Press (MA)","2009-09-01","0","1,","Default,","0","MIT Press","1292","","99,00","0","","","","Hardcover","0","","","Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. <i>Introduction to Algorithms</i> uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.<br /><br />The first edition became a widely used text in universities worldwide as well as the standard reference for professionals. The second edition featured new chapters on the role of algorithms, probabilistic analysis and randomized algorithms, and linear programming. The third edition has been revised and updated throughout. It includes two completely new chapters, on van Emde Boas trees and multithreaded algorithms, substantial additions to the chapter on recurrence (now called ""Divide-and-Conquer""), and an appendix on matrices. It features improved treatment of dynamic programming and greedy algorithms and a new notion of edge-based flow in the material on flow networks. Many new exercises and problems have been added for this edition. As of the third edition, this textbook is published exclusively by the MIT Press.","Computers / Reference","English","2017-02-18 10:57:30","0","0000-00-00","2017-02-18 10:57:30","df8d9a74b91ed5d4b6c9252659c21831",
+"232","Aho, Alfred V.|Hopcroft, John E.|Ullman, Jeffrey D.","Data Structures and Algorithms","9780201000238","Pearson","1983-01-11","0","1,","Default,","0","","400","","74,20","0","","","","Paperback","0","","","The authors' treatment of data structures in <i>Data Structures and Algorithms</i> is unified by an informal notion of ""abstract data types,"" allowing readers to compare different implementations of the same concept. Algorithm design techniques are also stressed and basic algorithm analysis is covered. Most of the programs are written in Pascal.","Reference / Questions & Answers","English","2017-02-18 10:57:51","0","0000-00-00","2017-02-18 10:57:51","48adc35414608da6bd648bc5981f0cd0",
+"233","Bentley, Jon|Bentley, Jon Louis","Programming Pearls","9780201657883","Addison-Wesley Professional","1999-10-07","0","1,","Default,","0","2nd Edition","256","","44,99","0","","","","Paperback","0","","","The first edition of Programming Pearls was one of the most influential books I read early in my career, and many of the insights I first encountered in that book stayed with me long after I read it. Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem. - Steve McConnell When programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that Programming Pearls has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect","Computers / Programming / General","English","2017-02-18 10:58:07","0","0000-00-00","2017-02-18 10:58:07","1f3607118db435c976697ffdefc09b77",
+"234","Mynatt, Barbee Teasley|Mynatt, Teasley Barbee","Software Engineering With Student Project Guidance","0138262314","Prentice-Hall","1989-10","0","1,","Default,","0","","384","","","0","","","","Paperback","0","","","Designed to be used in courses where study of software engineering is combined with a student-team software development project. The principles and techniques of software engineering are presented in a pragmatic way so that they can be applied to student projects.","","English","2017-02-18 10:58:36","0","0000-00-00","2017-02-18 10:58:36","4e880e68a7baad9ad3a68881aa1dcb73",
+"235","Owens, Michael|Owens, Mike","Definitive Guide to SQLite, The","9781590596739","Apress","2006-05-01","0","1,","Default,","0","","440","","59,99","0","","","","Hardcover","0","","","When I first began coding SQLite in the spring of 2000, I never imagined that it would be so enthusiastically received by the programming community. Today, there are millions and millions of copies of SQLite running unnoticed inside computers and gadgets made by hundreds of companies from around the world. You have probably used SQLite before without realizing it. SQLite might be inside your new cell phone or MP3 player or in the set-top box from your cable company. At least one copy of SQLite is probably found on your home computer; it comes built in on Apple s Mac OS X and on most versions of Linux, and it gets added to Windows when you install any of dozens of third-party software titles. SQLite backs many websites thanks in part to its inclusion in the PHP5 programming language. And SQLite is also known to be used in aircraft avionics, modeling and simulation programs, industrial controllers, smart cards, decision-support packages, and medical information systems. Since there are no reporting requirements on the use of SQLite, there are without doubt countless other deployments that are unknown to me. Much credit for the popularity of SQLite belongs to Michael Owens. Mike s articles on SQLite in The Linux Journal (June 2003) and in The C/C++ Users Journal (March 2004) int- duced SQLite to countless programmers. The traffic at the SQLite website jumped noticeably after each of these articles appeared.""","Computers / General","English","2017-02-18 10:59:06","0","0000-00-00","2017-02-18 10:59:06","b8edccf03bcf7935bde39a9ed07a5489",
+"236","Team, Adobe Creative|Inc., Adobe Systems|Bienz, Tim|Cohn, Richard|Systems, Adobe","Portable Document Format Reference Manual","9780201626285","Addison Wesley Publishing Company","1993-07-01","0","1,","Default,","0","APL","214","","24,95","0","","","","Paperback","0","","","PDF is the native file format for Adobe Systems' new technology, the Adobe Acrobat family of products. Its purpose is to allow representation of documents in a manner that is independent of the original application software, hardware, and operating system used to create those documents. Coverage her","Computers / General","English","2017-02-18 10:59:19","0","0000-00-00","2017-02-18 10:59:19","38bf129db7ce4494fb70057168279f0d",
+"237","Levine, John R.","Linkers and Loaders","9781558604964","Morgan Kaufmann Publishers","1999-10-25","0","1,","Default,","0","The Morgan Kaufmann Series in Software Engineering and Programming","256","","67,95","0","","","","Paperback","0","","","Whatever your programming language, whatever your platform, you probably tap into linker and loader functions all the time. But do you know how to use them to their greatest possible advantage? Only now, with the publication of <b>Linkers &amp; Loaders</b>, is there an authoritative book devoted entirely to these deep-seated compile-time and run-time processes. <br />The book begins with a detailed and comparative account of linking and loading that illustrates the differences among various compilers and operating systems. On top of this foundation, the author presents clear practical advice to help you create faster, cleaner code. You'll learn to avoid the pitfalls associated with Windows DLLs, take advantage of the space-saving, performance-improving techniques supported by many modern linkers, make the best use of the UNIX ELF library scheme, and much more. If you're serious about programming, you'll devour this unique guide to one of the field's least understood topics. <b>Linkers &amp; Loaders</b> is also an ideal supplementary text for compiler and operating systems courses. <br />*Includes a linker construction project written in Perl, with project files available for download. *Covers dynamic linking in Windows, UNIX, Linux, BeOS, and other operating systems. <br />*Explains the Java linking model and how it figures in network applets and extensible Java code. <br />*Helps you write more elegant and effective code, and build applications that compile, load, and run more efficiently.","Computers / Operating Systems / General","English","2017-02-18 10:59:29","0","0000-00-00","2017-02-18 10:59:29","47e4df81b1e4ae0a35ac5db3203cbb31",
+"238","Hamblen, James O.|Furman, Michael D.","Rapid Prototyping of Digital Systems: A Tutorial Approach","9780792374398","Springer","2004-06-30","0","1,","Default,","0","","270","","139,00","0","","","","Paperback","0","","","""Rapid Prototyping of Digital Systems, Second Edition"" provides an exciting and challenging laboratory component for an undergraduate digital logic design class. The more advanced topics and exercises are also appropriate for consideration at schools that have an upper level course in digital logic or programmable logic. <br />Design engineers working in industry will also want to consider this book for a rapid introduction to FPLD technology and logic synthesis using commercial CAD tools, especially if they have not had previous experience with the new and rapidly evolving technology. <br />Two tutorials on the Altera CAD tool environment, an overview of programmable logic, and a design library with several easy-to-use input and output functions were developed for this book to help the reader get started quickly. Early design examples use schematic capture and library components. VHDL is used for more complex designs after a short introduction to VHDL-based synthesis. <br />A coupon is included with the text for purchase of the new UP 1X board. The additional logic and memory in the UP 1X's FLEX 10K70 is useful on larger design projects such as computers and video games. <br />The second edition includes an update chapter on programmable logic, new robot sensors and projects, optional Verilog examples, and a meta assembler which can be used to develop assemble language programs for the computer designs in Chapters 8 and 13.","Computers / CAD-CAM","English","2017-02-18 10:59:42","0","0000-00-00","2017-02-18 10:59:42","0c776372fe6817ddb99efb6e4647207b",
+"239","Barnes, John","Programming in ADA 95 [With Special Edition of Objectada Compiler...]","9780201342932","Addison-Wesley Professional","1998-06-10","0","1,","Default,","0","International Computer Science Series","720","","52,99","0","","","","Paperback","0","","","This is the definitive text and reference for the new ADA 95 standard. It highlights the important changes from the ANSI 83 version: the increased support for object-oriented programming, the introduction of a hierarchical library structure and the inclusion of protected objects.","Computers / Programming Languages / Ada","English","2017-02-18 10:59:53","0","0000-00-00","2017-02-18 10:59:53","c6cc5aca984822dede87623372908819",
+"240","Gill, Arthur","Applied Algebra for the Computer Sciences","0130392227","Prentice Hall","1976-01-01","0","1,","Default,","0","Prentice-Hall series in automatic computation","432","","","0","","","","Unknown Binding","0","","","Text book","","English","2017-02-18 11:00:17","0","0000-00-00","2017-02-18 11:00:17","b814fefb3520ca64f60bfae59eae7e87",
+"241","Chandy, K. Mani|Misra, Jayadev","Parallel Program Design: A Foundation","0201058669","Addison Wesley Publishing Company","2000-06-13","0","1,","Default,","0","","516","","51,95","0","","","","Hardcover","0","","","This is a very good manual","Computers / General","English","2017-02-18 11:00:44","0","0000-00-00","2017-02-18 11:00:44","265fc8c37c2bb042d5b7fe332834be0c",
+"242","Meyer, Bertrand","Object-Oriented Software Construction (Book/CD-ROM)","9780136291558","Prentice Hall","1997-04-13","0","1,","Default,","0","2nd Edition","1296","","139,32","0","","","","Paperback","0","","","<P> <B> </B>This is, quite simply, the definitive reference on the most important development in software technology for the last 20 years: object-orientation.<B> </B>A whole generation was introduced to object technology through the first edition of this book. This long-awaited new edition retains the qualities of clarity, practicality and scholarship that made the first an instant best-seller, but has been thoroughly revised and expanded. Among the new topics covered in depth are: Concurrency, distribution, client/server and the Internet; object-oriented databases; design by contract; fundamental design patterns; finding classes; the use and misuse of inheritance; abstract data types; and typing issues. The book also includes completely updated discussions of reusability, modularity, software quality, object-oriented languages, memory management, and many other essential topics.<B> </B>All software developers and computer science students, worldwide. </P>","Computers / Programming / Object Oriented","English","2017-02-18 11:01:07","0","0000-00-00","2017-02-18 11:01:07","cd61a6c629af2343d8fb89f7fd55ffa9",
+"243","Hebert, Fred","Learn You Some Erlang for Great Good!","9781593274351","No Starch Press","2013-01-16","0","1,","Default,","0","","624","","49,95","0","","","","Paperback","0","","","Erlang is the language of choice for programmers who want to write robust, concurrent applications, but its strange syntax and functional design can intimidate the uninitiated. Luckily, there's a new weapon in the battle against Erlang-phobia: <i>Learn You Some Erlang for Great Good!</i><br /><br />Erlang maestro Fred Hebert starts slow and eases you into the basics: You'll learn about Erlang's unorthodox syntax, its data structures, its type system (or lack thereof!), and basic functional programming techniques. Once you've wrapped your head around the simple stuff, you'll tackle the real meat-and-potatoes of the language: concurrency, distributed computing, hot code loading, and all the other dark magic that makes Erlang such a hot topic among today's savvy developers.<br /><br />As you dive into Erlang's functional fantasy world, you'll learn about:<br /><br /><br />Testing your applications with EUnit and Common Test Building and releasing your applications with the OTP framework Passing messages, raising errors, and starting/stopping processes over many nodes Storing and retrieving data using Mnesia and ETS Network programming with TCP, UDP, and the inet module The simple joys and potential pitfalls of writing distributed, concurrent applications Packed with lighthearted illustrations and just the right mix of offbeat and practical example programs, <i>Learn You Some Erlang for Great Good!</i> is the perfect entry point into the sometimes-crazy, always-thrilling world of Erlang.","Computers / Web / General","English","2017-02-18 11:01:23","0","0000-00-00","2017-02-18 11:01:23","d6850f26a689f63902f2372f8380b5fe",
+"244","Stein, Jonathan (Y)|Stein, Jonathan Y.","Digital Signal Processing: A Computer Science Perspective","9780471295464","Wiley-Interscience","2000-10-09","0","1,","Default,","0","","880","","263,00","0","","","","Hardcover","0","","","Get a working knowledge of digital signal processing for computer science applications<br /> <br /> The field of digital signal processing (DSP) is rapidly exploding, yet most books on the subject do not reflect the real world of algorithm development, coding for applications, and software engineering. This important new work fills the gap in the field, providing computer professionals with a comprehensive introduction to those aspects of DSP essential for working on today's cutting-edge applications in speech compression and recognition and modem design. The author walks readers through a variety of advanced topics, clearly demonstrating how even such areas as spectral analysis, adaptive and nonlinear filtering, or communications and speech signal processing can be made readily accessible through clear presentations and a practical hands-on approach. In a light, reader-friendly style, Digital Signal Processing: A Computer Science Perspective provides:<br /> * A unified treatment of the theory and practice of DSP at a level sufficient for exploring the contemporary professional literature<br /> * Thorough coverage of the fundamental algorithms and structures needed for designing and coding DSP applications in a high level language<br /> * Detailed explanations of the principles of digital signal processors that will allow readers to investigate assembly languages of specific processors<br /> * A review of special algorithms used in several important areas of DSP, including speech compression/recognition and digital communications<br /> * More than 200 illustrations as well as an appendix containing the essential mathematical background","Technology & Engineering / Telecommunications","English","2017-02-18 11:01:41","0","0000-00-00","2017-02-18 11:01:41","a7b94ef4f79c06dbd8c8f0728cd41f49",
+"245","Erikson, Steven","Gardens of the Moon","0765348780","Tor Fantasy","2005-01-10","0","1,","Default,","0","The Malazan Book of the Fallen (1)|Malazan (5)|Das Spiel der Götter (1)|Gestas de Malaz","666","","9,99","0","","","","Mass Market Paperback","0","","","The Malazan Empire simmers with discontent, bled dry by interminable warfare, bitter infighting, and bloody confrontations. Even the imperial legions, long inured to the bloodshed, yearn for some respite. Yet Empress Laseen's rule remains absolute, enforced by her dread Claw assassins. <br /><br />For Sergeant Whiskeyjack and his squad of Bridgeburners, and for Tattersail, surviving cadre mage of the Second Legion, the aftermath of the siege of Pale should have been a time to mourn the many dead. But Darujhistan, last of the Free Cities of Genabackis, yet holds out. It is to this ancient citadel that Laseen turns her predatory gaze. <br /><br />But it would appear that the Empire is not alone in this great game. Sinister, shadowbound forces are gathering as the gods themselves prepare to play their hand....","","English","2017-02-18 11:02:14","0","0000-00-00","2017-02-18 11:02:14","83549e59ee72d6aa4eac511b9cd60e27",
+"246","Donahoo, Michael J.|Calvert, Kenneth L.","TCP/IP Sockets in C: Practical Guide for Programmers","9780123745408","Morgan Kaufmann Publishers","2009-03-01","0","1,","Default,","0","Morgan Kaufmann Practical Guides","196","","33,95","0","","","","Paperback","0","","","<i>TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition</i> is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.<br /><br />If you program using Java, be sure to check out this book's companion, <i>TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition</i>.<br /><br /><br /><br />Includes completely new and expanded sections that address the IPv6 network environment, defensive programming, and the select() system call, thereby allowing the reader to program in accordance with the most current standards for internetworking.<br />Streamlined and concise tutelage in conjunction with line-by-line code commentary allows readers to quickly program web-based applications without having to wade through unrelated and discursive networking tenets.","","English","2017-02-18 11:02:44","0","0000-00-00","2017-02-18 11:02:44","f38e431756722e0971d7b28e53077a99",
+"247","Larsson, Erik G","Signal, Information And Communications","","","2014-02-24","0","1,","Default,","0","","314","","","0","","","","","0","","","","","","2017-02-18 11:04:44","0","0000-00-00","2017-02-18 11:05:40","cc65a84b69cf88607afac55fe5fe2ddb",
+"248","Söderkvist, Sune","Kretsteori & Elektronik ","","Tryckeriet Erik Larsson AB","2005","0","1,","Default,","0","","438","","","0","","","","","0","","","","","","2017-02-18 11:14:15","0","0000-00-00","2017-02-18 11:14:15","327d97c5ef48b79634d14fa6b3068d19",
+"249","Kindborg, Mikael","Concurrent Comics: Programming of Social Agents","9173736511","Linköpings universitet","2003","0","1,","Default,","0","Linköping studies in science and technology","316","","","0","","","","Paperback","0","","","","","English","2017-02-18 11:14:49","0","0000-00-00","2017-02-18 11:14:49","bccbf518d1a93ecfda1d85ea364b8401",
+"250","Lundin, Erik Geijer","Uplink Load In CDMA Cellular Radio Systems","9185457493","LIU Tryck,Linköping","2005","0","1,","Default,","0","","170","","","0","","","","","0","","","","","","2017-02-18 11:17:43","0","0000-00-00","2017-02-18 11:17:43","e19702cbfb22b5c92c65e556c59a9ec5",
+"251","Olof Björner, Kerstin Holm","Grunderna i COBOL","9144063539","Akademisk Forlag","1974","0","1,","Default,","0","","208","","","0","","","","","0","","","","","","2017-02-18 11:19:05","0","0000-00-00","2017-02-18 11:19:05","90ce71301ef3ff9eded205455323d93b",
+"252","Björner, Olof","Avancerad COBOL","9144095112","Studentlitteratur","1974","0","1,","Default,","0","","269","","","0","","","","","0","","","","","","2017-02-18 11:20:40","0","0000-00-00","2017-02-18 11:20:40","e77ef61dbdf42309fbc6bd6b95c873c9",
+"253","Torkel Wallmark, Gunnar Carlstedt","Fälteffekt Transistorn","9117126022","P. A. Norstedt & Söners Förlag","1971","0","1,","Default,","0","","186","","","0","","","","","0","","","","","","2017-02-18 11:24:32","0","0000-00-00","2017-02-18 11:24:32","3f46ebe4904645034522e98379c6d190",
diff --git a/parse.scm b/parse.scm
new file mode 100755
index 0000000..8c8287a
--- /dev/null
+++ b/parse.scm
@@ -0,0 +1,103 @@
+#!/usr/bin/guile \
+-e main -s
+!#
+
+(add-to-load-path (dirname (current-filename)))
+
+(use-modules (srfi srfi-1)
+ (srfi srfi-8)
+ (srfi srfi-9)
+ (srfi srfi-26)
+
+ (ice-9 rdelim)
+ (ice-9 peg)
+
+ (patterns))
+
+
+;; var is the field to test
+;; symb is the expected value
+(define-syntax-rule (ensure-symbol var symb)
+ (unless (eqv? var symb)
+ (throw 'symbol-not-equal "Expected ~s, got ~s~%" symb var)))
+
+(define (load-csv filename)
+ (with-input-from-file filename
+ (lambda ()
+ (let* ((rawstr (read-delimited ""))
+ (match (match-pattern file rawstr))
+ (tree (keyword-flatten '(line)
+ (peg:tree match))))
+ tree))))
+
+;;; TODO sometimes part is a symbol instead of a list,
+;;; somehow an earlier part got consed on? or something?
+(define (get-part-data part)
+ (if (symbol? part)
+ (format #t "ERR: ~s~%" part)
+ (begin
+ (ensure-symbol (car part) 'field-part)
+ (cadr part))))
+
+;; ('line ('field ('field-part data) ...) ...) -> ({(data ...) | data} ...)
+(define (clean-peg-tree tree)
+ (map (lambda (line)
+ (ensure-symbol (car line) 'line)
+ (let ((fields (cdr line)))
+ (map (lambda (field)
+ (if (symbol? field)
+ #f
+ (begin (ensure-symbol (car field) 'field)
+ (map get-part-data (cdr field)))))
+ fields)))
+ tree))
+
+;; record-name should be a symbol
+(define (create-csv-type record-name first-line)
+ (let ((strname (string-append
+ "csv:"
+ (symbol->string record-name)))
+ (l (car first-line))
+ (rawfields (cdr first-line)))
+ (ensure-symbol l 'line)
+ (let ((fields
+ (map (lambda (field)
+ (ensure-symbol (car field) 'field)
+ (let ((rest (cadr field)))
+ (ensure-symbol (car rest) 'field-part)
+ (string->symbol (cadr rest))))
+ rawfields)))
+ (let* ((record-type (make-record-type strname fields))
+ (make-record (record-constructor record-type fields))
+ (predicate record-type))
+ (values record-type make-record predicate)))))
+
+
+(define (flatten-1 lst)
+ "If list is of length one return the first element,
+otherwise return the full list"
+ (if (= 1 (length lst))
+ (car lst)
+ lst))
+
+(define (get-db filename)
+ (let ((doc (load-csv filename)))
+ (receive (book make-book book?)
+ (create-csv-type 'book (car doc))
+ (map (lambda (line) ; returns a record
+ (ensure-symbol (car line) 'line)
+ (apply make-book
+ (map (lambda (field) ; returns a list or #f
+ (if (symbol? field)
+ #f
+ (begin
+ (ensure-symbol (car field) 'field)
+ (flatten-1
+ (map (lambda (part) ; returns [string]
+ (ensure-symbol (car part) 'field-part)
+ (cadr part))
+ (cdr field)))))
+ #; (cadr field)
+ )
+ (cdr line))))
+ (cdr doc)))))
diff --git a/patterns.scm b/patterns.scm
new file mode 100644
index 0000000..dc8ce98
--- /dev/null
+++ b/patterns.scm
@@ -0,0 +1,21 @@
+(define-module (patterns)
+ #:use-module (ice-9 peg)
+ #:export (file))
+
+(define-peg-pattern field-part all
+ (* (or "\\\""
+ (followed-by (or "|" "\""))
+ peg-any)))
+
+(define-peg-pattern field all
+ (and (ignore "\"")
+ (* (and field-part (ignore (? (or "|")))))
+ (ignore "\"")) )
+
+(define-peg-pattern line all
+ (+ (and field
+ (ignore (? ","))
+ (ignore (* " ")))))
+
+(define-peg-pattern file body
+ (+ (and line (ignore (? "\n")))))