Wednesday, 02 April 2025 |
This book looks at the use of differential privacy (DP) for protecting personal data by introducing carefully calibrated random numbers, called statistical noise, when the data is used. Google, Apple, and Microsoft have all integrated the technology into their software, and the US Census Bureau used DP to protect data collected in the 2020 census. In this book, Simson Garfinkel presents the underlying ideas of DP, and helps explain why DP is needed in today’s information-rich environment, why it was used as the privacy protection mechanism for the 2020 census, and why it is so controversial in some communities.
|
Monday, 31 March 2025 |
This book delves into programming 64-bit ARM CPUs. Following a fast-paced introduction to the art of programming in assembly and the GNU Assembler (Gas) specifically, Randall Hyde explores memory organization, data representation, and the basic logical operations you can perform on simple data types.
|
Friday, 28 March 2025 |
This book starts at the beginner level and shows how to use Flutter to create apps. Kevin Moore shows how to develop a movie app with animations, a movie API to get the latest movie information, and uses Firebase to store user information. The app connects to the internet, saves data locally, and uses Firebase to handle user accounts and send notifications. Readers will learn how to make the app work on websites and computers, respond to user actions, and add extra features from Flutter's package library. The final steps cover testing, making it run faster, and getting it ready for users to download.
|
Wednesday, 26 March 2025 |
This book shows how to handle errors, inefficiencies, and outdated paradigms by exploring the most common mistakes you'll find in production C++ code. Rich Yonts reveals the problems you'll inevitably encounter as you write new C++ code and diagnose legacy applications, along with practical techniques you need to resolve them. It covers C++ 98 through 23, with an emphasis on diagnosing and improving legacy code.
|
Monday, 24 March 2025 |
This book provides a unified overview of concepts and features of a comprehensive variety of rule-based programming languages. Thom Frühwirth presents formalisms including multiset transformation, term rewriting systems, colored Petri nNets and logical algorithms. Frühwirth also introduces rule-based systems including production rules, event-condition-action rules and datalog, as well as rule-based programming languages for functional orogramming, constraint logic programming and concurrent constraint programming.
|
Friday, 21 March 2025 |
This book is aimed at young coders, and breaks down complex programming concepts into easy-to-understand chunks, relating them to real-life examples that resonate with young minds. Starting with the absolute basics, Anand Pandey gradually progresses through 16 chapters packed with clear explanations, vibrant illustrations, and interactive activities. Each chapter concludes with a review quiz to reinforce learning and ensure mastery of the material.
|
Wednesday, 19 March 2025 |
This book looks at how Quarkus lets you live-reload your Java code, deliver continuous background testing, and automatically provide database instances. Martin Štefanko and Jan Martiška bring readers up to speed with Quarkus by building a real-world business application. The authors are Red Hat engineers who are both active contributors to the Quarkus project, and explain how Quarkus works, how you can integrate it into your stack for more productive Java development, and what makes Quarkus different from classic enterprise Java frameworks.
|
Monday, 17 March 2025 |
This is the fifth edition of a guide to building modern web APIs with Django & Django REST Framework. It is suitable for beginners who have never built an API before, as well as professional programmers looking for a fast-paced introduction to Django API fundamentals and best practices. William S. Vincent shows how to set up a new project properly, create and customize RESTful APIs, and integrate a Vue.js front-end. Three separate projects are built from scratch with progressively more advanced features, including a Library API, Todo API, and Blog API. User authentication, permissions, documentation, viewsets, and routers are all covered.
|
Friday, 14 March 2025 |
In this book, Chris Dixon argues that the internet has undergone three distinct eras, starting with the "read" era, in which early networks democratized information. In the "read-write" era, corporate networks democratized publishing. We are now in the midst of the "read-write-own" era, sometimes called web3, in which blockchain networks are granting power and economic benefits to communities of users, not just corporations.
|
Wednesday, 12 March 2025 |
This book shows how to write effective multithreaded and asynchronous software in C#. Nir Dobovizki demonstrates practical techniques, real-world examples, and useful code samples to cut through the confusion around async/await and help you write rapid, reliable, and bug-free code. The book focuses on the practical use of the C# async-await feature to simplify asynchronous tasks. It teaches how to avoid common pitfalls, addresses classic multithreading issues like deadlocks and race conditions, and advanced topics such as controlling thread of execution and using thread-safe collections.
|
Monday, 10 March 2025 |
This book has been fully updated for the latest version of Office 365, and covers coding basics and syntax for writing simple or complex macros that can automate routine Excel tasks. Dick Kusleika shows how to automate data management, user forms, and pivot tables. The book also teaches how to control the security settings for macros and save macros to use across files and apps. Plus updated coverage of Copilot AI integration.
|
Friday, 07 March 2025 |
In this book, subtitled "Hard Power, Soft Belief, and the Future of the West", Alexander C. Karp and Nicholas W. Zamiska, co-founder and his deputy at Palantir argue that timid leadership, intellectual fragility, and an unambitious view of technology’s potential in Silicon Valley have made the U.S. vulnerable in an era of mounting global threats.
|
|
|