{"id":1105,"date":"2012-10-08T19:29:04","date_gmt":"2012-10-08T17:29:04","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1105"},"modified":"2024-10-14T13:54:44","modified_gmt":"2024-10-14T11:54:44","slug":"books-programming","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2012\/10\/08\/books-programming\/","title":{"rendered":"Books (Programming)"},"content":{"rendered":"<p style=\"text-align: justify;\">[amazon_link id=\u201c1449322700\u201d target=\u201c_blank\u201d ]Windows Powershell for Developers[\/amazon_link].&nbsp;For decades, the strongest point of Unices systems have always been its scriptability, beginning with the pipe paradigm of&nbsp;Unices commands introduced by the command shell (Bourne, C, <span class=\"caps\">KSH<\/span>,\u2026) and expanded by the capabilities of Perl\/Python. But that is just to change, with the quantum leap introduced by Microsoft in next version Powershell: more than 2300 cmdlets, powerful remoting enabling distributed automation of tasks, Windows Workflows and access to almost every application via <span class=\"caps\">COM<\/span> and .<span class=\"caps\">NET<\/span> interfaces. All these and more, will erode and leapfrog the traditional competitive advantages of Unices systems. But to really master Powershell, it\u2019s much better to start from the perspective of the professional developer and skip all the deficient scripting done by systems administrators. Thus this book is the perfect starting point, in that it not only shows the tips\u2019n\u2019tricks of Powershell, it also teaches by example how to extend applications via embedded scripts.<\/p>\n<p style=\"text-align: justify;\">[amazon_link id=\u201c3642087825\u201d target=\u201c_blank\u201d ]Formal Correctness of Security Protocols (Information Security and Cryptography)[\/amazon_link]. A theoretical and practical guide to the generation of formal proofs for security protocols using the inductive method, an ambitious enterprise of mixed results which is of primordial importance in a field of ever-growing complexity and numerous definitions of what is secure. Short and straight to the point, this book offers lots of code for the Isabelle theorem prover of some prominent security protocols: Kerberos <span class=\"caps\">IV<\/span> <span class=\"amp\">&amp;<\/span> V, Shoup-Rubin, the Abadi-Glew-Horne-Pinkas protocol for certified mail and the non-repudiation protocol of Zhou-Gollman. The best part of this book is the last chapter, in which an honest recollection of statistics shows the effort dedicated to model each security protocol.<\/p>\n<p style=\"text-align: justify;\">[amazon_link id=\u201c<span class=\"caps\">142006973X<\/span>\u201d target=\u201c_blank\u201d ]Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R[\/amazon_link]. Pedagogical, practical and with tons of examples, it progresses from pseudo-code to Perl and R source code for the most common algorithms of this interdisciplinary field, in which the beauty of nature is left to be interpreted and apprehended with some basic computer data structures: sequences for <span class=\"caps\">DNA<\/span> pattern matching; trees for phylogenetic and <span class=\"caps\">RNA<\/span> reconstruction; and graphs for biochemical reactions and metabolic pathways. Although it lacks of theorems is worrisome, it certainly fits its objective target of biologists with little exposure to formal computer science.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[amazon_link id=\u201c1449322700\u201d target=\u201c_blank\u201d ]Windows Powershell for Developers[\/amazon_link].&nbsp;For decades, the strongest point of Unices systems have always been its scriptability, beginning with the pipe paradigm of&nbsp;Unices commands introduced by the command shell (Bourne, C, <span class=\"caps\">KSH<\/span>,\u2026) and expanded by the capabilities of Perl\/Python. But that is just to change, with the quantum leap introduced by Microsoft in&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[11,15],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1105"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1105"}],"version-history":[{"count":4,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1105\/revisions"}],"predecessor-version":[{"id":1584,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1105\/revisions\/1584"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1105"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}