How Software Works : (Record no. 109246)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05968nam a22004573i 4500 |
001 - CONTROL NUMBER | |
control field | EBC4503164 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729130430.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2015 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781593277178 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781593276669 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC4503164 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL4503164 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr11250535 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)919509027 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.5.S6663 2015 |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.3 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Spraul, V. Anton. |
245 10 - TITLE STATEMENT | |
Title | How Software Works : |
Remainder of title | The Magic Behind Encryption, CGI, Search Engines, and Other Everyday Technologies. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | San Francisco : |
Name of producer, publisher, distributor, manufacturer | No Starch Press, Incorporated, |
Date of production, publication, distribution, manufacture, or copyright notice | 2015. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2015. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (217 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Acknowledgments -- Introduction -- Who This Book Is For -- Topics Covered -- Behind the Magic -- Chapter 1: Encryption -- The Goal of Encryption -- Transposition: Same Data, Different Order -- Cipher Keys -- Attacking the Encryption -- Substitution: Replacing Data -- Varying the Substitution Pattern -- Key Expansion -- The Advanced Encryption Standard -- Binary Basics -- AES Encryption: The Big Picture -- Key Expansion in AES -- AES Encryption Rounds -- Block Chaining -- Why AES Is Secure -- Possible AES Attacks -- The Limits of Private-Key Encryption -- Chapter 2: Passwords -- Transforming a Password into a Number -- Properties of Good Hash Functions -- The MD5 Hash Function -- Encoding the Password -- Bitwise Operations -- MD5 Hashing Rounds -- Meeting the Criteria of a Good Hash Function -- Digital Signatures -- The Problem of Identity -- Collision Attacks -- Passwords in Authentication Systems -- The Dangers of Password Tables -- Hashing Passwords -- Dictionary Attacks -- Hash Tables -- Hash Chaining -- Iterative Hashing -- Salting Passwords -- Are Password Tables Safe? -- Password Storage Services -- A Final Thought -- Chapter 3: Web Security -- How Public-Key Cryptography Solves the Shared Key Problem -- Math Tools for Public-Key Cryptography -- Invertible Functions -- One-Way Functions -- Trapdoor Functions -- The RSA Encryption Method -- Creating the Keys -- Encrypting Data with RSA -- RSA Effectiveness -- RSA Use in the Real World -- RSA for Authentication -- Security on the Web: HTTPS -- Handshaking -- Transmitting Data Under HTTPS -- The Shared Key Problem Solved? -- Chapter 4: Movie CGI -- Software for Traditional Animation -- How Digital Images Work -- How Colors Are Defined -- How Software Makes Cel Animations. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | From Cel Animation Software to Rendered 2D Graphics -- Software for 3D CGI -- How 3D Scenes Are Described -- The Virtual Camera -- Direct Lighting -- Global Illumination -- How Light Is Traced -- Full-Scene Anti-Aliasing -- Combining the Real and the Fake -- The Ideal of Movie-Quality Rendering -- Chapter 5: Game Graphics -- Hardware for Real-Time Graphics -- Why Games Don't Ray Trace -- All Lines and No Curves -- Projection Without Ray Tracing -- Rendering Triangles -- The Painter's Algorithm -- Depth Buffering -- Real-Time Lighting -- Shadows -- Ambient Light and Ambient Occlusion -- Texture Mapping -- Nearest-Neighbor Sampling -- Bilinear Filtering -- Mipmaps -- Trilinear Filtering -- Reflections -- Faking Curves -- Distant Impostors -- Bump Mapping -- Tessellation -- Anti-Aliasing in Real Time -- Supersampling -- Multisampling -- Post-Process Anti-Aliasing -- The Rendering Budget -- What's Next in Game Graphics -- Chapter 6: Data Compression -- Run-Length Encoding -- Dictionary Compression -- The Basic Method -- Huffman Encoding -- Reorganizing Data for Better Compression -- Predictive Encoding -- Quantization -- JPEG Images -- A Different Way to Store Colors -- The Discrete Cosine Transformation -- The DCT for Two Dimensions -- Compressing the Results -- JPEG Picture Quality -- Compressing High-Definition Video -- Temporal Redundancy -- MPEG-2 Video Compression -- Video Quality with Temporal Compression -- The Present and Future of Video Compression -- Chapter 7: Search -- Defining the Search Problem -- Putting Data in Order -- Selection Sort -- Quicksort -- Binary Search -- Indexing -- Hashing -- Searching the Web -- Ranking Results -- Using the Index Effectively -- What's Next for Web Search -- Chapter 8: Concurrency -- Why Concurrency Is Needed -- Performance -- Multiuser Environments -- Multitasking -- How Concurrency Can Fail. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Making Concurrency Safe -- Read-Only Data -- Transaction-Based Processing -- Semaphores -- The Problem of Indefinite Waits -- Orderly Queues -- Starvation from Circular Waits -- Performance Issues of Semaphores -- What's Next for Concurrency -- Chapter 9: Map Routes -- What a Map Looks Like to Software -- Best-First Search -- Reusing Prior Search Results -- Finding All the Best Routes at Once -- Floyd's Algorithm -- Storing Route Directions -- The Future of Routing -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | How Software Works explains everyday software to the non-programmer. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer software. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Spraul, V. Anton |
Title | How Software Works |
Place, publisher, and date of publication | San Francisco : No Starch Press, Incorporated,c2015 |
International Standard Book Number | 9781593276669 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4503164">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4503164</a> |
Public note | Click to View |
No items available.