Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theoretical Introduction to Programming

Buy
Including easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to be both a how-to handbook and easy reference guide. Discussions of principle, worked examples and exercises are presented. All concepts outside introductory programming are explained with clear demarcation and dependencies so the experienced programmer can quickly locate material. Readable in a linear manner, with short mono-thematic to encourage dipping and reference. Also included are sections on open problems in software theory and practice. While little other than a novice programmer's knowledge is explicitly assumed, a certain conceptual maturity, either through commercial programming or academic training is required – each language is introduced and explained briefly as needed.

This book is organised into a large number of brief, self-contained entries.

Admittedly, there is no such thing as a self-contained entry. For example, you need some knowledge of English to understand this paragraph. But, the principle is that each entry, of one or two pages, is a conceptual whole as well as a part of a greater whole (see note 20) in the same way that a car has four whole wheels, and not eight half wheels.

Some entries are intended to demonstrate a technique, or introduce an historically contingent fact such as the actual syntax of a contemporary language, or in this case, a specific issue regarding this book. Others are intended to illustrate a more eternal truth. They may be about a contemporary language, but stress a philosophical position or broadly based attitude. Both of these I have called notions. Finally, there are entries that are intended to cause the reader to do something other than just nodding their head as a sign of either agreement or an incipient dormant state. These are the exercises.
(HTML tags aren't allowed.)

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...

Real-Time Video Compression (The International Series in Engineering and Computer Science)
Real-Time Video Compression (The International Series in Engineering and Computer Science)
Real-Time Video Compression: Techniques and Algorithms introduces the XYZ video compression technique, which operates in three dimensions, eliminating the overhead of motion estimation. First, video compression standards, MPEG and H.261/H.263, are described. They both use asymmetric compression algorithms, based on motion estimation. Their...
Special Edition Using Microsoft Excel 2000
Special Edition Using Microsoft Excel 2000
If data rules your life, odds are you're using (or you soon will be) Excel 2000, Microsoft's revised version of its premier spreadsheet application. Excel's complexity can be daunting, especially if you're a power user who intends to use it at advanced levels. With Special Edition: Using Microsoft Excel 2000, you can get a jump on the new...
Windows XP Under the Hood: Hardcore Windows Scripting and Command Line Power
Windows XP Under the Hood: Hardcore Windows Scripting and Command Line Power

Get ready to roll up those shirtsleeves, pop the hood, and get a little Windows grime under those fingernails! This is a book about tools, nuts and bolts. Through lucid tutorials and examples, Windows XP Under the Hood shows how to use scripting and batch tools to automate repetitive tasks. You'll master the gory details of the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy