
Introduction To The Theory ...
Essential programmingThis market leading text on computational theory provides a mathematical treatment of computer science theory designed around theorems and proofs.
This market leading text on computational theory provides a mathematical treatment of computer science theory designed around theorems and proofs.
On the other hand, the best managers also understand the job their employees are trying to do. The same is true of pattern matching in Perl. The more thoroughly you understand of how Perl goes about the task of matching any particular ...
Consisting of three appendices, the summary half of the book gives source code for a selection of widely used Common Lisp operators, with definitions that offer a comprehensive explanation of the language and provide a rich source of real ...
Experienced practitioners Richardson and Gwaltney give inside information on the practicalities of managing a development project, whether from the aforesaid garage or from the largest cube farm in th.
In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases.
Meanwhile,. back. at. the. PizzaStore. The design for the PizzaStore is really shaping up: it's got a flexible framework and it does a good job of adhering to design principles. Now, the key to Objectville Pizza's success has always been fresh, ...
Daniel Paul Friedman. True: as long as we use the names consistently, we are just fine. And mk-length is a far more equal name than length. If we use a name like mk-length, it is a constant reminder that the first argument to mk-length is ...
Most of the book is devoted to discussions of individual tools, but throughout run the themes of combining programs and of using programs to build programs--emphasizing how they fit in the environment.
Structure and Interpretation of Computer Programs has had a dramatic impact on computer science curricula over the past decade. This long-awaited revision contains changes throughout the text.
If you develop sites or applications for the Web, this book is an absolute must.
Features the best practices in the art and science of constructing software--topics include design, applying good techniques to construction, eliminating errors, planning, managing construction activities, and relating personal character to ...
This long-awaited revision contains changesthroughout the text.There are new implementations of most of the major programming systems in thebook, including the interpreters and compilers, and the authors have incorporated many small ...
With Design Patterns as your guide, you will learn how these important patterns fit into the software development process, and how you can leverage them to solve your own design problems most efficiently.
Computer whiz kid Rusty Harrington establishes a very special relationship with ARIEL, his father's top-secret artificial intelligence project, in a story of romance, industrial espionage, friendship, and state-of-the-art computer ...
In twenty-first-century Los Angeles, three dissimilar sleuths--therapist Martin Burke, ambitious cop Mary Choy, and Richard Fettle, the killer's offbeat colleague--investigate diverse reasons why poet Emanuel Goldsmith would senselessly ...
When scientist Clare Conway travels to Arizona for a conference, she finds herself on the run from a religious cult, ruthless computer spies, and the government, of all whom think she knows the secrets of the Quantum computer, a device that ...
Spackle. Dialogue. Beck studied for MCATs and drank beer. It was Italian beers that week, so he had a Raffo or a Poretti. While he worked, he watched that Grundig portable he'd rented with Grandma Beckett's latest check. He'd just picked it ...
Ten. The memo began: to: T. J. Heller, Director NCDC from: Sheldon Byers, Security Liaison re: Inventory of Federally Funded Research in Paranormal Phenomena It had been delivered to Heller's office in a sealed envelope marked ' Strictly ...