Rapid Fire


Book Description

This work will be of interest to enthusiasts of the technical aspects of military, naval and aviation history. It provides a comprehensive account of the use of heavy machine guns, automatic cannons and their ammunition, featuring coverage of cartridge design and various projectiles.




Python Pocket Reference


Book Description

Updated for both Python 3.4 and 2.7, this convenient pocket guide is the perfect on-the-job quick reference. Youâ??ll find concise, need-to-know information on Python types and statements, special method names, built-in functions and exceptions, commonly used standard library modules, and other prominent Python tools. The handy index lets you pinpoint exactly what you need. Written by Mark Lutzâ??widely recognized as the worldâ??s leading Python trainerâ??Python Pocket Reference is an ideal companion to Oâ??Reillyâ??s classic Python tutorials, Learning Python and Programming Python, also written by Mark. This fifth edition covers: Built-in object types, including numbers, lists, dictionaries, and more Statements and syntax for creating and processing objects Functions and modules for structuring and reusing code Pythonâ??s object-oriented programming tools Built-in functions, exceptions, and attributes Special operator overloading methods Widely used standard library modules and extensions Command-line options and development tools Python idioms and hints The Python SQL Database API




The Pragmatic Programmer


Book Description

What others in the trenches say about The Pragmatic Programmer... “The cool thing about this book is that it’s great for keeping the programming process fresh. The book helps you to continue to grow and clearly comes from people who have been there.” — Kent Beck, author of Extreme Programming Explained: Embrace Change “I found this book to be a great mix of solid advice and wonderful analogies!” — Martin Fowler, author of Refactoring and UML Distilled “I would buy a copy, read it twice, then tell all my colleagues to run out and grab a copy. This is a book I would never loan because I would worry about it being lost.” — Kevin Ruland, Management Science, MSG-Logistics “The wisdom and practical experience of the authors is obvious. The topics presented are relevant and useful.... By far its greatest strength for me has been the outstanding analogies—tracer bullets, broken windows, and the fabulous helicopter-based explanation of the need for orthogonality, especially in a crisis situation. I have little doubt that this book will eventually become an excellent source of useful information for journeymen programmers and expert mentors alike.” — John Lakos, author of Large-Scale C++ Software Design “This is the sort of book I will buy a dozen copies of when it comes out so I can give it to my clients.” — Eric Vought, Software Engineer “Most modern books on software development fail to cover the basics of what makes a great software developer, instead spending their time on syntax or technology where in reality the greatest leverage possible for any software team is in having talented developers who really know their craft well. An excellent book.” — Pete McBreen, Independent Consultant “Since reading this book, I have implemented many of the practical suggestions and tips it contains. Across the board, they have saved my company time and money while helping me get my job done quicker! This should be a desktop reference for everyone who works with code for a living.” — Jared Richardson, Senior Software Developer, iRenaissance, Inc. “I would like to see this issued to every new employee at my company....” — Chris Cleeland, Senior Software Engineer, Object Computing, Inc. “If I’m putting together a project, it’s the authors of this book that I want. . . . And failing that I’d settle for people who’ve read their book.” — Ward Cunningham Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a requirement and producing working, maintainable code that delights its users. It covers topics ranging from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse. Read this book, and you'll learn how to Fight software rot; Avoid the trap of duplicating knowledge; Write flexible, dynamic, and adaptable code; Avoid programming by coincidence; Bullet-proof your code with contracts, assertions, and exceptions; Capture real requirements; Test ruthlessly and effectively; Delight your users; Build teams of pragmatic programmers; and Make your developments more precise with automation. Written as a series of self-contained sections and filled with entertaining anecdotes, thoughtful examples, and interesting analogies, The Pragmatic Programmer illustrates the best practices and major pitfalls of many different aspects of software development. Whether you're a new coder, an experienced programmer, or a manager responsible for software projects, use these lessons daily, and you'll quickly see improvements in personal productivity, accuracy, and job satisfaction. You'll learn skills and develop habits and attitudes that form the foundation for long-term success in your career. You'll become a Pragmatic Programmer.




Romanticism


Book Description

"This stylish and erudite thematic study of the influence Romanticism exerts upon Western culture and particularly the visual arts is the companion volume to Honour's equally valuable Neo-classicism.... The text is supported by a useful selection of illustrations Excellent footnotes and a good index. Finely produced, Romanticism will stimulate the graduate and inform the undergraduate." —Choice "An interpretation that rings true for our own time.... His approach to his vast subject is essentially cool, analytic and balanced This is a book that covers an immense amount of material with a freshness of touch." —John Russell, The New York Times "A book of great interest and quality which gives form to a subject that is often treated very vaguely." —Kenneth Clark




Buried Rivers


Book Description

After the Holocaust how do we not lose faith in humanity? In 2006 the author began a series of life-changing journeys to Poland to reconcile her family's traumatic legacy with the question of basic goodness. Interwoven with her uncle's Auschwitz survivor account, the memoir intimately explores family loyalties, inherited trauma, and spirituality.




Advanced Machine Learning with Python


Book Description

Solve challenging data science problems by mastering cutting-edge machine learning techniques in Python About This Book Resolve complex machine learning problems and explore deep learning Learn to use Python code for implementing a range of machine learning algorithms and techniques A practical tutorial that tackles real-world computing problems through a rigorous and effective approach Who This Book Is For This title is for Python developers and analysts or data scientists who are looking to add to their existing skills by accessing some of the most powerful recent trends in data science. If you've ever considered building your own image or text-tagging solution, or of entering a Kaggle contest for instance, this book is for you! Prior experience of Python and grounding in some of the core concepts of machine learning would be helpful. What You Will Learn Compete with top data scientists by gaining a practical and theoretical understanding of cutting-edge deep learning algorithms Apply your new found skills to solve real problems, through clearly-explained code for every technique and test Automate large sets of complex data and overcome time-consuming practical challenges Improve the accuracy of models and your existing input data using powerful feature engineering techniques Use multiple learning techniques together to improve the consistency of results Understand the hidden structure of datasets using a range of unsupervised techniques Gain insight into how the experts solve challenging data problems with an effective, iterative, and validation-focused approach Improve the effectiveness of your deep learning models further by using powerful ensembling techniques to strap multiple models together In Detail Designed to take you on a guided tour of the most relevant and powerful machine learning techniques in use today by top data scientists, this book is just what you need to push your Python algorithms to maximum potential. Clear examples and detailed code samples demonstrate deep learning techniques, semi-supervised learning, and more - all whilst working with real-world applications that include image, music, text, and financial data. The machine learning techniques covered in this book are at the forefront of commercial practice. They are applicable now for the first time in contexts such as image recognition, NLP and web search, computational creativity, and commercial/financial data modeling. Deep Learning algorithms and ensembles of models are in use by data scientists at top tech and digital companies, but the skills needed to apply them successfully, while in high demand, are still scarce. This book is designed to take the reader on a guided tour of the most relevant and powerful machine learning techniques. Clear descriptions of how techniques work and detailed code examples demonstrate deep learning techniques, semi-supervised learning and more, in real world applications. We will also learn about NumPy and Theano. By this end of this book, you will learn a set of advanced Machine Learning techniques and acquire a broad set of powerful skills in the area of feature selection & feature engineering. Style and approach This book focuses on clarifying the theory and code behind complex algorithms to make them practical, useable, and well-understood. Each topic is described with real-world applications, providing both broad contextual coverage and detailed guidance.




I Will Survive


Book Description

I Will Survive is the story of Gloria Gaynor, America's "Queen of Disco." It is the story of riches and fame, despair, and finally salvation. Her meteoric rise to stardom in the mid-1970s was nothing short of phenomenal, and hits poured forth that pushed her to the top of the charts, including "Honey Bee," "I Got You Under My Skin," "Never Can Say Goodbye," and the song that has immortalized her, "I Will Survive," which became a #1 international gold seller. With that song, Gloria heralded the international rise of disco that became synonymous with a way of life in the fast lane - the sweaty bodies at Studio 54, the lines of cocaine, the indescribable feeling that you could always be at the top of your game and never come down. But down she came after her early stardom, and problems followed in the wake, including the death of her mother, whose love had anchored the young singer, as well as constant battles with weight, drugs, and alcohol. While her fans always imagined her to be rich, her personal finances collapsed due to poor management; and while many envied her, she felt completely empty inside. In the early 1980s, sustained by her marriage to music publisher Linwood Simon, Gloria took three years off and reflected upon her life. She visited churches and revisited her mother's old Bible. Discovering the world of gospel, she made a commitment to Christ that sustains her to this day.




Hacking Exposed Wireless


Book Description

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys




West Country Way


Book Description