ORPP logo

How Software Works : (Record no. 109246)

MARC details
000 -LEADER
fixed length control field 05968nam a22004573i 4500
001 - CONTROL NUMBER
control field EBC4503164
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729130430.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2015 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781593277178
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781593276669
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC4503164
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL4503164
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11250535
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)919509027
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.5.S6663 2015
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.3
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Spraul, V. Anton.
245 10 - TITLE STATEMENT
Title How Software Works :
Remainder of title The Magic Behind Encryption, CGI, Search Engines, and Other Everyday Technologies.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Francisco :
Name of producer, publisher, distributor, manufacturer No Starch Press, Incorporated,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (217 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Acknowledgments -- Introduction -- Who This Book Is For -- Topics Covered -- Behind the Magic -- Chapter 1: Encryption -- The Goal of Encryption -- Transposition: Same Data, Different Order -- Cipher Keys -- Attacking the Encryption -- Substitution: Replacing Data -- Varying the Substitution Pattern -- Key Expansion -- The Advanced Encryption Standard -- Binary Basics -- AES Encryption: The Big Picture -- Key Expansion in AES -- AES Encryption Rounds -- Block Chaining -- Why AES Is Secure -- Possible AES Attacks -- The Limits of Private-Key Encryption -- Chapter 2: Passwords -- Transforming a Password into a Number -- Properties of Good Hash Functions -- The MD5 Hash Function -- Encoding the Password -- Bitwise Operations -- MD5 Hashing Rounds -- Meeting the Criteria of a Good Hash Function -- Digital Signatures -- The Problem of Identity -- Collision Attacks -- Passwords in Authentication Systems -- The Dangers of Password Tables -- Hashing Passwords -- Dictionary Attacks -- Hash Tables -- Hash Chaining -- Iterative Hashing -- Salting Passwords -- Are Password Tables Safe? -- Password Storage Services -- A Final Thought -- Chapter 3: Web Security -- How Public-Key Cryptography Solves the Shared Key Problem -- Math Tools for Public-Key Cryptography -- Invertible Functions -- One-Way Functions -- Trapdoor Functions -- The RSA Encryption Method -- Creating the Keys -- Encrypting Data with RSA -- RSA Effectiveness -- RSA Use in the Real World -- RSA for Authentication -- Security on the Web: HTTPS -- Handshaking -- Transmitting Data Under HTTPS -- The Shared Key Problem Solved? -- Chapter 4: Movie CGI -- Software for Traditional Animation -- How Digital Images Work -- How Colors Are Defined -- How Software Makes Cel Animations.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note From Cel Animation Software to Rendered 2D Graphics -- Software for 3D CGI -- How 3D Scenes Are Described -- The Virtual Camera -- Direct Lighting -- Global Illumination -- How Light Is Traced -- Full-Scene Anti-Aliasing -- Combining the Real and the Fake -- The Ideal of Movie-Quality Rendering -- Chapter 5: Game Graphics -- Hardware for Real-Time Graphics -- Why Games Don't Ray Trace -- All Lines and No Curves -- Projection Without Ray Tracing -- Rendering Triangles -- The Painter's Algorithm -- Depth Buffering -- Real-Time Lighting -- Shadows -- Ambient Light and Ambient Occlusion -- Texture Mapping -- Nearest-Neighbor Sampling -- Bilinear Filtering -- Mipmaps -- Trilinear Filtering -- Reflections -- Faking Curves -- Distant Impostors -- Bump Mapping -- Tessellation -- Anti-Aliasing in Real Time -- Supersampling -- Multisampling -- Post-Process Anti-Aliasing -- The Rendering Budget -- What's Next in Game Graphics -- Chapter 6: Data Compression -- Run-Length Encoding -- Dictionary Compression -- The Basic Method -- Huffman Encoding -- Reorganizing Data for Better Compression -- Predictive Encoding -- Quantization -- JPEG Images -- A Different Way to Store Colors -- The Discrete Cosine Transformation -- The DCT for Two Dimensions -- Compressing the Results -- JPEG Picture Quality -- Compressing High-Definition Video -- Temporal Redundancy -- MPEG-2 Video Compression -- Video Quality with Temporal Compression -- The Present and Future of Video Compression -- Chapter 7: Search -- Defining the Search Problem -- Putting Data in Order -- Selection Sort -- Quicksort -- Binary Search -- Indexing -- Hashing -- Searching the Web -- Ranking Results -- Using the Index Effectively -- What's Next for Web Search -- Chapter 8: Concurrency -- Why Concurrency Is Needed -- Performance -- Multiuser Environments -- Multitasking -- How Concurrency Can Fail.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Making Concurrency Safe -- Read-Only Data -- Transaction-Based Processing -- Semaphores -- The Problem of Indefinite Waits -- Orderly Queues -- Starvation from Circular Waits -- Performance Issues of Semaphores -- What's Next for Concurrency -- Chapter 9: Map Routes -- What a Map Looks Like to Software -- Best-First Search -- Reusing Prior Search Results -- Finding All the Best Routes at Once -- Floyd's Algorithm -- Storing Route Directions -- The Future of Routing -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. How Software Works explains everyday software to the non-programmer.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Spraul, V. Anton
Title How Software Works
Place, publisher, and date of publication San Francisco : No Starch Press, Incorporated,c2015
International Standard Book Number 9781593276669
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4503164">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4503164</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.