Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
This book takes a humorous slant on the programming practice manual by reversing the usual approach: under the pretence of teaching you how to become the world’s worst programmer who generally causes chaos, the book teaches you how to avoid the kind of bad habits that introduce bugs or cause code contributions to be rejected....
Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
It is widely acknowledged that the cost of validation and testing comprises a significant
percentage of the overall development costs for electronic systems today,
and is expected to escalate sharply in the future. Many studies have shown that
up to 70% of the design development time and resources are spent on functional...
Control Techniques for Complex Networks
Control Techniques for Complex Networks
A representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the...
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
"This book speaks with experience. It gives you the building blocks for a plan to tackle a difficult code base and the context for techniques like refactoring. It is a sad fact that there are too few of these kinds of books out there, when reengineering is such a common event. But I'm at least glad to see that while there aren't many books in...
Java(TM) Puzzlers : Traps, Pitfalls, and Corner Cases
Java(TM) Puzzlers : Traps, Pitfalls, and Corner Cases

How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you!

In the tradition of Effective Java™, Bloch and Gafter dive...

Ruby in Practice
Ruby in Practice
Ruby in Practice increases your productivity by showing you specific Ruby techniques you can use in your projects. The book offers detailed strategies for using Ruby in a large-scale environment. You'll see concrete examples of integration, messaging, web development, and databases, all presented in a clear Problem/Solution format. This...
Core Java, Vol. 2: Advanced Features, 8th Edition
Core Java, Vol. 2: Advanced Features, 8th Edition
The book you have in your hands is the second volume of the eighth edition of Core Java™, fully updated for Java SE 6. The first volume covers the essential features of the language; this volume covers the advanced topics that a programmer will need to know for professional software development. Thus, as with...
Sams Teach Yourself Samba in 24 Hours (2nd Edition)
Sams Teach Yourself Samba in 24 Hours (2nd Edition)
When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
Testing Computer Software, 2nd Edition
Testing Computer Software, 2nd Edition

This book will teach you how to test computer software under real-world conditions. The authors have all been test managers and software development managers at well-known Silicon Valley software companies. Successful consumer software companies have learned how to produce high-quality products under tight time and budget constraints. The...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy