R Books


The Crystal Ball Instruction Manual, Volume 2

Python

This book, The Crystal Ball Instruction Manual: Volume Two, Foundations for Data Science, continues the series. The author, Stephen Davies, explains that the first volume was titled "Introduction to Data Science" because it provided an initial, broad tour of the field. He notes that the reader's continued interest indicates a readiness to explore t

Making Servers Work

Linux

This book highlights practical sysadmin skills, common architectures that you'll encounter, and best practices that apply to automating and running systems at any scale, from one laptop or server to 1,000 or more. It is intended to help orient you within the discipline, and hopefully encourages you to learn more about system administration.

Introduction to Ada

Ada

Today, Ada is heavily used in embedded real-time systems, many of which are safety critical. While Ada is and can be used as a general-purpose language, it will really shine in low-level applications: - Embedded systems with low memory requirements (no garbage collector allowed) - Direct interfacing with hardware - Soft or hard real-time systems -

Think C++

C / C++

Think C++ is an introduction to programming using the C++ language. Allen Downey originally wrote it to help students prepare for the Computer Science AP exam when the exam covered C++.

A Byte of Python

Python

Python is one of those rare languages which can claim to be both simple and powerful. You will find yourself pleasantly surprised to see how easy it is to concentrate on the solution to the problem rather than the syntax and structure of the language you are programming in. A Byte of Python is a free book on programming using the Python language. I

FreeBSD Architecture Handbook

BSD

The "FreeBSD Architecture Handbook" book provides a comprehensive technical reference for the internal architecture and subsystems of the FreeBSD operating system. It details kernel internals including bootstrapping processes, locking mechanisms, and system initialization frameworks like SYSINIT. The handbook extensively covers security architectur

Password

Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the digital age if not the unauthorized use of a password? In untangling the histories, cultural contexts and philosophies of the password, Martin Paul Eve

Statistics Done Wrong

Statistics

Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised how many scientists are doing it wrong. Statistics Done Wrong is a pithy, essential guide to statistical blunders in modern science that will show you how t

Java Everywhere Again with DukeScript

Java DukeScript

For many years, Java Swing enabled developers to write applications that could run on any operating system. The author notes that this all came to an end with the arrival of smart phones, tablets, and embedded computers. The text explains that in the enterprise, the desktop dominated for many years. In the meantime, however, almost every IT project

Microservices: From Design to Deployment

Microservices

Microservices are currently getting a lot of attention: articles, blogs, discussions on social media, and conference presentations. They are rapidly heading towards the peak of inflated expectations on the Gartner Hype cycle At the same time, there are skeptics in the software community who dismiss microservices as nothing new. Naysayers claim that