You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The defacto standard - a must-have for all LISP programmers. In this greatly expanded edition of the defacto standard, you'll learn about the nearly 200 changes already made since original publication - and find out about gray areas likely to be revised later. Written by the Vice- Chairman of X3J13 (the ANSI committee responsible for the standardization of Common Lisp) and co-developer of the language itself, the new edition contains the entire text of the first edition plus six completely new chapters. They cover: - CLOS, the Common Lisp Object System, with new features to support function overloading and object-oriented programming, plus complete technical specifications * Loops, a powerful control structure for multiple variables * Conditions, a generalization of the error signaling mechanism * Series and generators * Plus other subjects not part of the ANSI standards but of interest to professional programmers. Throughout, you'll find fresh examples, additional clarifications, warnings, and tips - all presented with the author's customary vigor and wit.
Peter Seibel interviews 15 of the most interesting computer programmers alive today in Coders at Work, offering a companion volume to Apress’s highly acclaimed best-seller Founders at Work by Jessica Livingston. As the words “at work” suggest, Peter Seibel focuses on how his interviewees tackle the day-to-day work of programming, while revealing much more, like how they became great programmers, how they recognize programming talent in others, and what kinds of problems they find most interesting. Hundreds of people have suggested names of programmers to interview on the Coders at Work web site: www.codersatwork.com. The complete list was 284 names. Having digested everyone’s feedbac...
This reference manual provides a complete description of the C language, the run-time libraries, and a style of C programming that emphasises correctness, portability, and maintainability.
A comprehensive step-by-step guide
Enjoy this bad boy book by Best-selling billionaire romance author Michelle Love.... Arsen had Steele nearly where he wanted her. She found herself interested in his dark desires and he thought she might be a viable candidate as his submissive mistress. After testing the waters a bit with her, Arsen was impressed with how well she reacted to his strict ways. The only drawback was the authorities were beginning to hammer him with questions and he had to answer things he'd rather Steele not know about him at that time, or ever. Steele found herself thinking about how much it was possible Arsen did kill the women he was so close to being formally accused of. It began to bother her how much Arsen was pressing her to prove she trusted him explicitly.
This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable system...
Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies. On the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including: - Hacktivism; hackers and p...