Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions
Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions

This expanded and updated edition of "Practical Enterprise Software Development Techniques" includes a new chapter which explains what makes enterprise scale software development different from other development endeavors. Chapter 4 has been expanded with additional coverage of code review, bug tracker systems and agile software...

Sams Teach Yourself Xcode 4 in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself Xcode 4 in 24 Hours (Sams Teach Yourself -- Hours)

So you’ve decided to write applications for OS X or iOS. You sit down at your Macintosh, start up Xcode, and… what? Create a project? Create a file? Make a storyboard? Build a Core Data model? What?


For an operating system that prides itself on being accessible to many,
...
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
SproutCore Web Application Development
SproutCore Web Application Development

Creating fast, powerful, and feature-rich web applications using the SproutCore HTML5 framework

Overview

  • Write next-gen HTML5 apps using the SproutCore framework and tools
  • Get started right away by creating a powerful application in the very first chapter
  • Build your...
Programming in the Key of C#
Programming in the Key of C#

This is a book for people who want to learn the C# programming language. I’ve tried my best to avoid making assumptions about any prior programming experience you might or might not have had. The book begins with variables and ends with a program that plays music.

C# is a modern, object-oriented...

C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
It is widely acknowledged that the cost of validation and testing comprises a significant
percentage of the overall development costs for electronic systems today,
and is expected to escalate sharply in the future. Many studies have shown that
up to 70% of the design development time and resources are spent on functional...
Control Techniques for Complex Networks
Control Techniques for Complex Networks
A representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the...
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy