R Books
The Crystal Ball Instruction Manual, Volume 2
This book, The Crystal Ball Instruction Manual: Volume Two, Foundations for Data Science, continues the series. The author, Stephen Davies, explains that the first volume was titled "Introduction to Data Science" because it provided an initial, broad tour of the field. He notes that the reader's continued interest indicates a readiness to explore t
Making Servers Work
This book highlights practical sysadmin skills, common architectures that you'll encounter, and best practices that apply to automating and running systems at any scale, from one laptop or server to 1,000 or more. It is intended to help orient you within the discipline, and hopefully encourages you to learn more about system administration.
Introduction to Ada
Today, Ada is heavily used in embedded real-time systems, many of which are safety critical. While Ada is and can be used as a general-purpose language, it will really shine in low-level applications: - Embedded systems with low memory requirements (no garbage collector allowed) - Direct interfacing with hardware - Soft or hard real-time systems -
Think C++
Think C++ is an introduction to programming using the C++ language. Allen Downey originally wrote it to help students prepare for the Computer Science AP exam when the exam covered C++.
A Byte of Python
Python is one of those rare languages which can claim to be both simple and powerful. You will find yourself pleasantly surprised to see how easy it is to concentrate on the solution to the problem rather than the syntax and structure of the language you are programming in. A Byte of Python is a free book on programming using the Python language. I
FreeBSD Architecture Handbook
The "FreeBSD Architecture Handbook" book provides a comprehensive technical reference for the internal architecture and subsystems of the FreeBSD operating system. It details kernel internals including bootstrapping processes, locking mechanisms, and system initialization frameworks like SYSINIT. The handbook extensively covers security architectur
Password
Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the digital age if not the unauthorized use of a password? In untangling the histories, cultural contexts and philosophies of the password, Martin Paul Eve
Statistics Done Wrong
Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised how many scientists are doing it wrong. Statistics Done Wrong is a pithy, essential guide to statistical blunders in modern science that will show you how t
Java Everywhere Again with DukeScript
For many years, Java Swing enabled developers to write applications that could run on any operating system. The author notes that this all came to an end with the arrival of smart phones, tablets, and embedded computers. The text explains that in the enterprise, the desktop dominated for many years. In the meantime, however, almost every IT project
Microservices: From Design to Deployment
Microservices are currently getting a lot of attention: articles, blogs, discussions on social media, and conference presentations. They are rapidly heading towards the peak of inflated expectations on the Gartner Hype cycle At the same time, there are skeptics in the software community who dismiss microservices as nothing new. Naysayers claim that