Home | Amazing | Today | Tags | Publishers | Years | Search 
Ruby on Rails Bible

Buy
Ruby on Rails Bible, 9780470258224 (0470258225), John Wiley & Sons, 2008
Thanks to the explosive growth in popularity of the Rails framework, the equally popular Ruby programming language now has a great place to hang its hat. The powerful combination of the two provides the perfect toolset to create Web applications that feature concise code, clean syntax, and easy maintenance. This must-have book is your best guide on how to jump on the RoR bandwagon—from the basics of Ruby programming to advanced techniques for experienced Rails developers.

Get on the RoR track and build powerful Web apps with ease

Thanks to the explosive growth in popularity of the Rails framework, the equally popular Ruby programming language now has a great place to hang its hat. The powerful combination of the two provides the perfect toolset to create Web applications that feature concise code, clean syntax, and easy maintenance. This must-have book is your best guide on how to jump on the RoR bandwagon, from the basics of Ruby programming to advanced techniques for experienced Rails developers.

  • Get up to speed on Ruby basics, including objects, irb, and built-ins

  • Explore the Model, Controller, and View layers of the Rails framework

  • Understand the "convention over configuration" philosophy of Ruby on Rails

  • Walk through the development of a complete Rails application

  • Set up a database, build a model, use scripts, and test and debug

  • Master advanced Rails, including Prototype, Scriptaculous, and topics such as Web Services

About the Author

Timothy Fisher is an RoR evangelist and software architect with the Professional Services Group of Compuware Corporation. He has over fifteen years of experience in the software development industry. Tim started and maintains the Michigan Ruby Users Group Web site, www.rubymi.org, and is also owner and developer of a forthcoming Ruby learning Web site, www.learnruby.org. He is also a technical writer and author.
Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Beginning OS X Lion Apps Development (Beginning Apress)
Beginning OS X Lion Apps Development (Beginning Apress)

Mac OS X offers an amazing development environment for scores of technologies. It seems that developers from numerous camps are migrating to Mac en masse. Scan the room at any Ruby or Rails conference, for example, and you’ll see programmers coding on Macs almost exclusively. As developers move to Mac, almost inevitably they...

Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...


Computational Diffusion MRI and Brain Connectivity: MICCAI Workshops, Nagoya, Japan, September 22nd, 2013 (Mathematics and Visualization)
Computational Diffusion MRI and Brain Connectivity: MICCAI Workshops, Nagoya, Japan, September 22nd, 2013 (Mathematics and Visualization)

This volume contains the proceedings from two closely related workshops: Computational Diffusion MRI (CDMRI’13) and Mathematical Methods from Brain Connectivity (MMBC’13), held under the auspices of the 16th International Conference on Medical Image Computing and Computer Assisted Intervention, which took place in Nagoya, Japan,...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Embedded Systems (World Class Designs)
Embedded Systems (World Class Designs)
"Novice developers will find this book to be invaluable. But more experienced developers will enjoy the breadth and probably pick up a few tricks or insights in less familiar areas." - William Wong, Electronic Design, June 2008

All the design and development inspiration and direction an embedded engineer
...
©2024 LearnIT (support@pdfchm.net) - Privacy Policy