The Samba Spying Scandal


Book Description




The Samba Spying Case


Book Description

On the detention of Indian military personnel in 1979 on charges of alleged passing defense information to Pakistan.




The Samba Spying Scandal


Book Description




The Price of Loyalty


Book Description

Narration of a victim of the Samba Spy Scandal, in which a group of personnel of the Indian Army were imprisoned and tortured on false charges of espionage.




Tcl/Tk in a Nutshell


Book Description

The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the wide variety of commands, many offering a wealth of options. Most of the things you'd like to do have been anticipated by the language's creator, John Ousterhout, or one of the developers of Tcl/Tk's many powerful extensions. Thus, you'll find that a command or option probably exists to provide just what you need.And that's why it's valuable to have a quick reference that briefly describes every command and option in the core Tcl/Tk distribution as well as the most popular extensions. Keep this book on your desk as you write scripts, and you'll be able to find almost instantly the particular option you need.Most chapters consist of alphabetical listings. Since Tk and mega-widget packages break down commands by widget, the chapters on these topics are organized by widget along with a section of core commands where appropriate. Contents include: Core Tcl and Tk commands and Tk widgets C interface (prototypes) Expect [incr Tcl] and [incr Tk] Tix TclX BLT Oratcl, SybTcl, and Tclodbc




New Delhi


Book Description




The Metamorphosis of Prime Intellect


Book Description

In a time not far from our own, Lawrence sets out simply to build an artifical intelligence that can pass as human, and finds himself instead with one that can pass as a god. Taking the Three Laws of Robotics literally, Prime Intellect makes every human immortal and provides instantly for every stated human desire. Caroline finds no meaning in this life of purposeless ease, and forgets her emptiness only in moments of violent and profane exhibitionism. At turns shocking and humorous, "Prime Intellect" looks unflinchingly at extremes of human behavior that might emerge when all limits are removed. An international Internet phenomenon, "Prime Intellect" has been downloaded more than 10,000 times since its free release in January 2003. It has been read and discussed in Australia, Canada, Denmark, Germany, Japan, Mexico, the Netherlands, Slovenia, South Africa, and other countries. This Lulu edition is your chance to own "Prime Intellect" in conventional book form.







Freedom in the World 2004


Book Description

Freedom in the World contains both comparative ratings and written narratives and is now the standard reference work for measuring the progress and decline in political rights and civil liberties on a global basis.




Working Effectively with Legacy Code


Book Description

Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform—with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes.