OpenLibra | Más recientes http://www.etnassoft.com/olrss/all/newest/num_items=10/ La Biblioteca Libre Online es-ES OpenLibra 15 http://www.etnassoft.com/wp-content/themes/etnassoft/images/layout/openlibra_logo.png OpenLibra | Más recientes http://www.etnassoft.com/olrss/all/newest/num_items=10/ <![CDATA[Computer Systems]]>Book Cover
Titulo: Computer Systems
Autor: Daniel J. Taipala
Publicacion: 2013
Editorial: University of the People
Num. Paginas: 172
Tamano: 2.36 Mbs (zip)
Idioma: Inglés

Categorias: Algoritmos, Arquitectura, Programación
Etiquetas: álgebra booleana, Boole, Lenguaje máquina, Lógica, Puertas lógicas, Sistemas de computación

This book has been developed as a companion text to the University of the People course CS1104 Computer Systems. The University of the People is an accredited online university that offers programs in business administration and computer science. The university is unique in that it has no tuition, is tuition free, non-profit, and serves students from around the world. The computer systems course takes the student on a fascinating journey that begins by learning the properties of conductors and semiconductors, through an understanding of how these properties are used to create transistors as switches. It continues with the concepts of logic gates, which are assembled into circuits, and eventually ends with the student developing their own computer system and writing assembly language programs for the computer system they design.

]]>
<![CDATA[GIMP Magazine #10]]>Book Cover
Titulo: GIMP Magazine #10
Autor: Varios
Publicacion: 2014
Editorial: Autoedición
Num. Paginas: 37
Tamano: 20.06 Mbs (zip)
Idioma: Inglés

Categorias: GIMP Magazine, Revistas
Etiquetas: Diseño, Gimp, GIMP Magazine, HDR, Retoque fotográfico, Revistas

Welcome to Issue #10 of GIMP Magazine! In ten issues we have covered so much ground. We have covered various types of photography, graphic design, digital illustration and even graphic novels/cartoons. We've shown you various techniques in GIMP and other open source software tools (i.e. Inkscape, Scribus, and My Paint) through in-depth tutorials written by amazing experts from around the world. We have shown you what these programs are capable of, and have covered topics such as how to set up and use a stylist. We even covered a comprehensive feature comparison between GIMP and Photoshop. And, best of all, we've featured amazing works from all over the world in our various galleries. This issue features amazing photography from some amazing places. Christian Schroll takes us on a journey of some pretty cool landscapes and landmarks, and also shares a master-class of how he creates HDR (High Dynamic Range) photography in a multi-page, detailed tutorial.

]]>
<![CDATA[Infraestructura distribuida para la construcción de paquetes Debian]]>Book Cover
Titulo: Infraestructura distribuida para la construcción de paquetes Debian
Autor: José Luis Sanroma Tato
Publicacion: 2014
Editorial: Autoedición
Num. Paginas: 204
Tamano: 2.97 Mbs (zip)
Idioma: Español

Categorias: GNU / Linux, Software Libre
Etiquetas: BOINC, Debian, GNU/Linux, Paquetes, Programación, Scrum, Software libre

Desde hace algunos años, empresas, universidades, grupos de investigación, o similares, que se dedican al desarrollo de software, desarrollan sus propios paquetes que posteriormente son usados por sus propios trabajadores o clientes. Estos paquetes de software (como todo software), necesitan ser servidos, mantenidos y actualizados de alguna forma. Para ello se usan repositorios. En el caso del Software Libre, una de las opciones es utilizar repositorios no oficiales de Debian que gestionan paquetes Debian. Estos repositorios no oficiales pueden crearse con la ayuda de reprepro que permite al usuario crear un repositorio personal con todas las características de uno oficial. En lugares como el Laboratorio de investigación ARCO de la Escuela Superior de Informática de la Universidad de Castilla-La Mancha, existen computadores de diferentes arquitecturas debido a la renovación que van sufriendo los equipos con el paso del tiempo. Por ello, un problema típico que existe es la construcción de un paquete, por ejemplo, con arquitectura amd64. En el momento que se sube al repositorio, sucederá que a este paquete solo podrán acceder los usuarios de amd64. Si un usuario de i386 quiere acceder a ese paquete, tiene que conseguir el código fuente, construirlo y volver a subir el paquete al repositorio. Por lo tanto, es un requisito contar con al menos un computador con esa arquitectura que pueda utilizarse para construir el paquete y que ese usuario, o alguien que sepa hacerlo, se dedique a construirlo usando ese computador u otro con la misma arquitectura. Con lo cual existe una necesidad, y es tener una versión de los paquetes compatible con cada una de las arquitecturas soportadas en el laboratorio para que pueda ser usada por los trabajadores.

]]>
<![CDATA[Introducción a la Teoría de Números. Ejemplos y Algoritmos]]>Book Cover
Titulo: Introducción a la Teoría de Números. Ejemplos y Algoritmos
Autor: Walter Mora
Publicacion: 2014
Editorial: Instituo Tecnológico de Costa Rica
Num. Paginas: 219
Tamano: 3.19 Mbs (zip)
Idioma: Español

Categorias: Ciencia, Matemáticas
Etiquetas: Algoritmia, Ciencia, Java, Matemáticas, Números, Números primos, Potencias

La Teoría de Números estudia los números enteros y, en cierta medida los números racionales y los números algebraicos. La Teoría Computacional de Números (Computational Number Theory) es sinónimo de Teoría Algorítmica de Números. Aquí se estudia los algoritmos eficientes para cálculos en teoría de números. Este es un libro introductorio orientado hacia la teoría algorítmica de números. El interés es mostrar el valor puramente teórico de algunos teoremas y cómo se debe hacer una variación si el propósito es cálculos rápidos y eficientes. Algunas algoritmos sencillos se implementan en VBA Excel o en LibreOffice Basic por ser lenguajes muy amigables y por ser las hojas electrónicas muy familiares para los estudiantes. Sin embargo estas implementaciones son muy limitadas y solo tienen fines didácticos. Otras implementaciones se hacen en Java (para usar enteros y racionales grandes). En el capítulo final se desarrollan algunos programas en Java que sirven de base para implementar otros algoritmos.

]]>
<![CDATA[Combinatorics Through Guided Discovery]]>Book Cover
Titulo: Combinatorics Through Guided Discovery
Autor: Kenneth P. Bogart
Publicacion: 2004
Editorial: National Science Foundation Grant Number
Num. Paginas: 202
Tamano: 826 Kbs (zip)
Idioma: Inglés

Categorias: Ciencia, Matemáticas
Etiquetas: árboles de datos, Ciencia, Combinatoria, Distribución, Funciones, Grafos, Inducción, Matemáticas, Pascal

This book is an introduction to combinatorial mathematics, also known as combinatorics. The book focuses especially but not exclusively on the part of combinatorics that mathematicians refer to as “counting.” The book consists almost entirely of problems. Some of the problems are designed to lead you to think about a concept, others are designed to help you figure out a concept and state a theorem about it, while still others ask you to prove the theorem. Other problems give you a chance to use a theorem you have proved. From time to time there is a discussion that pulls together some of the things you have learned or introduces a new idea for you to work with. Many of the problems are designed to build up your intuition for how combinatorial mathematics works . There are problems that some people will solve quickly, and there are problems that will take days of thought for everyone. Probably the best way to use this book is to work on a problem until you feel you are not making progress and then go on to the next one. Think about the problem you couldn’t get as you do other things. The next chance you get, discuss the problem you are stymied on with other members of the class. Often you will all feel you’ve hit dead ends, but when you begin comparing notes and listening carefully to each other, you will see more than one approach to the problem and be able to make some progress. In fact, after comparing notes you may realize that there is more than one way to interpret the problem. In this case your first step should be to think together about what the problem is actually asking you to do. You may have learned in school that for every problem you are given, there is a method that has already been taught to you, and you are supposed to figure out which method applies and apply it. That is not the case here. Based on some simplified examples, you will discover the method for yourself. Later on, you may recognize a pattern that suggests you should try to use this method again.

]]>
<![CDATA[Mechanics]]>Book Cover
Titulo: Mechanics
Autor: Benjamin Crowell
Publicacion: 2015
Editorial: Light and Matter
Num. Paginas: 558
Tamano: 37.70 Mbs (zip)
Idioma: Inglés

Categorias: Ciencia, Física
Etiquetas: Ciencia, Cinemática, Conservación, Física, Gravedad, Mecánica, Newton, Resonancia, Vectores, Vibración

This is a calculus-based book meant for the first semester of the type of freshman survey course taken by engineering and physical science majors. A treatment of relativity is interspersed with the Newtonian mechanics, in optional sections. The book is designed so that it can be used as a drop-in replacement for the corresponding part of Simple Nature, for instructors who prefer a traditional order of topics. Simple Nature does energy before force, while Mechanics does force before energy. Simple Nature has its treatment of relativity all in a single chapter, rather than in parallel with the development of Newtonian mechanics. Brief Contents: Motion in one dimension Motion in three dimensions Conservation laws Vibrations

]]>
<![CDATA[Precalculus: An Investigation of Functions]]>Book Cover
Titulo: Precalculus: An Investigation of Functions
Autor: David Lippman & Melonie Rasmussen
Publicacion: 2014
Editorial: Autoedición
Num. Paginas: 568
Tamano: 7.00 Mbs (zip)
Idioma: Inglés

Categorias: Ciencia, Matemáticas
Etiquetas: Ciencia, Funciones, Logaritmos, Matemáticas, Polinomios, Trigonometría

Over the years, when reviewing books we found that many had been mainstreamed by the publishers in an effort to appeal to everyone, leaving them with very little character. There were only a handful of books that had the conceptual and application driven focus we liked, and most of those were lacking in other aspects we cared about, like providing students sufficient examples and practice of basic skills. The largest frustration, however, was the never ending escalation of cost and being forced into new editions every three years. We began researching open textbooks, however the ability for those books to be adapted, remixed, or printed were often limited by the types of licenses, or didn’t approach the material the way we wanted. In writing this book, our focus was on the story of functions. We begin with function notation, a basic toolkit of functions, and the basic operation with functions: composition and transformation. Building from these basic functions, as each new family of functions is introduced we explore the important features of the function: its graph, domain and range, intercepts, and asymptotes. The exploration then moves to evaluating and solving equations involving the function, finding inverses, and culminates with modeling using the function. The "rule of four" is integrated throughout - looking at the functions verbally, graphically, numerically, as well as algebraically. We feel that using the “rule of four” gives students the tools they need to approach new problems from various angles. Often the “story problems of life” do not always come packaged in a neat equation. Being able to think critically, see the parts and build a table or graph a trend, helps us change the words into meaningful and measurable functions that model the world around us.

]]>
<![CDATA[OpenIntro Statistics. Second Edition]]>Book Cover
Titulo: OpenIntro Statistics. Second Edition
Autor: Varios
Publicacion: 2014
Editorial: Autoedición
Num. Paginas: 426
Tamano: 8.84 Mbs (zip)
Idioma: Inglés

Categorias: Algoritmos, Programación
Etiquetas: Datos, Distribución, Inferencia, Probabilidad, Regresión lineal

The chapters of this book are as follows: Introduction to data. Data structures, variables, summaries, graphics, and basic data collection techniques. Probability (special topic). The basic principles of probability. An understanding of this chapter is not required for the main content in Chapters 3-8. Distributions of random variables. Introduction to the normal model and other key distributions. Foundations for inference. General ideas for statistical inference in the context of estimating the population mean. Inference for numerical data. Inference for one or two sample means using the normal model and t distribution, and also comparisons of many means using ANOVA. Inference for categorical data. Inference for proportions using the normal and chisquare distributions, as well as simulation and randomization techniques. Introduction to linear regression. An introduction to regression with two variables. Multiple and logistic regression. An introduction to multiple regression and logistic regression for an accelerated course. OpenIntro Statistics was written to allow flexibility in choosing and ordering course topics. The material is divided into two pieces: main text and special topics. The main text has been structured to bring statistical inference and modeling closer to the front of a course. Special topics, labeled in the table of contents and in section titles, may be added to a course as they arise naturally in the curriculum.

]]>
<![CDATA[Discovering the Brain]]>Book Cover
Titulo: Discovering the Brain
Autor: Sandra Ackerman
Publicacion: 1992
Editorial: National Academy Press
Num. Paginas: 194
Tamano: 2.54 Mbs (zip)
Idioma: Inglés

Categorias: Biología, Ciencia
Etiquetas: Aprendizaje, Biología, Cerebro, Ciencia, Neurociencia, Neurología, Percepción, Química

The brain is the last and grandest biological frontier, the most complex thing we have yet discovered in our universe. It contains hundreds of billions of cells interlinked through trillions of connections. The brain boggles the mind. The diseases that disrupt brain function are among the most painful and destructive we know—Alzheimer's disease, schizophrenia, Huntington's disease, and others. They invade the mind, tearing at the fabric of family life and shattering the attributes that make us most human. These diseases are the enemy; neuroscientists are fighters on the front lines. Their weapons are new ideas, tested by experimentation. The revolution in modern biology has supplied science with a formidable armamentarium, well stocked with purchases made using federal dollars. The health of neuroscience today rests firmly on this foundation of public investment. Since World War II, our nation has consistently supported biomedical research, creating the most robust research enterprise the world has ever seen. That success, evidenced by the prizes and international recognition accorded American scientists, has depended on champions within government.

]]>
<![CDATA[The Spy in the Sandbox: Practical Cache Attacks in Javascript]]>Book Cover
Titulo: The Spy in the Sandbox: Practical Cache Attacks in Javascript
Autor: Varios
Publicacion: 2015
Editorial: Columbia University
Num. Paginas: 14
Tamano: 1.04 Mbs (zip)
Idioma: Inglés

Categorias: Javascript / AJAX, Textos Académicos
Etiquetas: Javascript, Paper, Programación, Seguridad

We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim’s machine – to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extremely relevant and practical to today’s web, especially since most desktop browsers currently accessing the Internet are vulnerable to this attack. Our attack, which is an extension of the last-level cache attacks of Yarom et al., allows a remote adversary recover information belonging to other processes, other users and even other virtual machines running on the same physical host as the victim web browser. We describe the fundamentals behind our attack, evaluate its performance using a high bandwidth covert channel and finally use it to construct a system-wide mouse/network activity logger. Defending against this attack is possible, but the required countermeasures can exact an impractical cost on other benign uses of the web browser and of the computer.

]]>