Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ruby Pocket Reference

Buy
Ruby Pocket Reference, 9781491926017 (1491926015), O'Reilly, 2015

Updated for Ruby 2.2, this handy reference offers brief yet clear explanations of Ruby’s core elements—from operators to blocks to documentation creation—and highlights the key features you may work with every day. Need to know the correct syntax for a conditional? Forgot the name of that String method? This book is organized to help you find the facts fast.

Ruby Pocket Reference, 2nd Edition is ideal for experienced programmers who are new to Ruby. Whether you’ve come to Ruby because of Rails, or you want to take advantage of this clean, powerful, and expressive language for other applications, this reference will help you easily pinpoint the information you need.

You’ll find detailed reference material for:

  • Keywords, operators, comments, numbers, and symbols
  • Variables, pre-defined global variables, and regular expressions
  • Conditional statements, method use, classes, and exception handling
  • Methods for the BasicObject, Object, Kernel, String, Array, and Hash classes
  • Time formatting directives
  • New syntax since Ruby 1.9
(HTML tags aren't allowed.)

Access Database Design and Programming (Nutshell Handbook)
Access Database Design and Programming (Nutshell Handbook)
This second edition of the best-selling Access Database Design &
Programming covers Access' new VBA Integrated Development
Environment used by Word, Excel, and Powerpoint; the VBA language
itself; Microsoft's latest data access technology, Active Data Objects
(ADO); plus Open Database Connectivity (ODBC).

This
...
Hardcore Visual Basic: Version 5.0
Hardcore Visual Basic: Version 5.0
Bruce McKinney's Hardcore Visual Basic is a revised edition of his guide to advanced programming in VB. Updated for Visual Basic 5.0, this book is best at outlining some of the new language features in Visual Basic 5.0, especially its improved support for type libraries and object-oriented programming. The heart of this book is dedicated...
End-to-End Game Development: Creating Independent Serious Games and Simulations from Start to Finish
End-to-End Game Development: Creating Independent Serious Games and Simulations from Start to Finish

In the award-winning AMC television series Mad Men, set in the early 1960s, a mysterious and massive machine shows up one day in the offices of the advertising agency Stirling Cooper. The machine is a Xerox photocopier, and the workplace is about to change forever. Previously, document duplication was done with a mimeograph, a hand-cranked...


Games And Simulations in Online Learning: Research And Development Frameworks
Games And Simulations in Online Learning: Research And Development Frameworks
Nearly all early learning happens during play, and new technology has added video games to the list of ways children learn interaction and new concepts. Although video games are everywhere, on Web sites, in stores, streamed to the desktop, on television, they are absent from the classroom. Computer-based simulations, a form of computer games, have...
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews,...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy